ID

VAR-201210-0316


CVE

CVE-2012-3939


TITLE

Cisco WebEx Recording Format Player Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2012-005134

DESCRIPTION

Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 before LD SP32 EP10 and T28 before T28.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted WRF file, aka Bug ID CSCua61331. Cisco WebEx Recording Format (WRF) Player Contains a buffer overflow vulnerability. Cisco WebEx is prone to multiple remote memory-corruption vulnerabilities. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Cisco WebEx is a set of Web conferencing tools developed by American Cisco (Cisco), which can assist office workers in different places to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing and enterprise instant messaging (IM). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Cisco WebEx .wrf Memory Corruption Vulnerability 1. *Advisory Information* Title: Cisco WebEx .wrf Memory Corruption Vulnerability Advisory ID: CORE-2012-0613 Advisory URL: http://www.coresecurity.com/content/webex-wrf-memory-corruption-vulnerability Date published: 2012-10-11 Date of last update: 2012-09-13 Vendors contacted: Cisco Release mode: Coordinated release 2. *Vulnerability Information* Class: Access of Memory Location After End of Buffer [CWE-788] Impact: Code execution Remotely Exploitable: No Locally Exploitable: Yes CVE Name: CVE-2012-3939 3. *Vulnerability Description* A vulnerability exists in atas32.dll affecting Cisco WebEx Player v3.26 that allows an attacker to corrupt memory, which may lead to code execution in the context of the currently logged on user. 4. *Vulnerable packages* . Cisco WebEx Player v3.26 . Cisco Meeting Center and older versions of WebEx Player are probably affected too, but they were not checked. 5. *Vendor Information, Solutions and Workarounds* If the Cisco WebEx WRF Player was automatically installed, it will be automatically upgraded to the latest, nonvulnerable version when users access a recording file that is hosted on a WebEx meeting site. A non-vulnerable version of Cisco WebEx Player should be available at http://www.webex.com/downloadplayer.html. 6. *Credits* This vulnerability was discovered and researched by Oren Isacson. The publication of this advisory was coordinated by Fernando russ. 7. *Technical Description / Proof of Concept* The memory corruption is caused by a call to the memcpy function with an invalid destination parameter. In our proof of concept (POC), the destination parameter to the memcpy function points to unmapped memory. The source parameters points to valid heap memory. The size parameter is equal to 540. As the destination parameter is close to the top of the heap, and the source parameter points to data that may be user-controlled, this vulnerability may be leveraged to execute code. 8. *Report Timeline* . 2012-06-21: Core Security Technologies notifies Cisco Product Security Incident Response Team of the vulnerability, including a brief description of the issue. 2012-06-21: Cisco PSIRT acknowledges the receipt of the information. Vendor asks for detailed technical information. 2012-06-21: Core sends a draft version of the advisory and a PoC .wrf file which reproduce the issue. 2012-06-25: Cisco PSIRT asks for more information regarding the exact version of the atas32.dll libary version. 2012-06-25: Core sends the requested information. 2012-07-11: Core notifies that the tentative publication deadline was missed and reschedule the publication for August 6th, 2012. 2012-07-12: Cisco PSIRT asks if the advisory publication can be hold until they have finished its fixes. 2012-07-12: Core notifies that the current publication date is tentative and can be moved while the new publication date keeps reasonable. 2012-07-16: Cisco PSIRT informs that they can't be sure of having fixes sooner that beginning of September. 2012-07-17: Core acknowledges the new timeframe for the publication and asks for a more specific date. 2012-07-20: Cisco PSIRT informs that the new publication date for the fixes and all the related information regarding this vulnerability is September 12th, 2012. 2012-07-23: Core Security Technologies acknowledges the new deadline for the publication. 2012-08-23: Cisco PSIRT asks to postpone the publication date to October 10th, 2012. 2012-08-27: Core acknowledges the new deadline for the publication. 2012-09-12: Publication date confirmed on [2012-07-20] missed. 2012-10-11: Advisory CORE-2012-0613 published. 9. *About CoreLabs* CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://corelabs.coresecurity.com. 10. *About Core Security Technologies* Core Security Technologies enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and demonstrate real-world exposures to their most critical assets. Our customers can gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations. Core Security's software solutions build on over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com. 11. *Disclaimer* The contents of this advisory are copyright (c) 2012 Core Security Technologies and (c) 2012 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/ 12. *PGP/GPG Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (Darwin) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQEcBAEBAgAGBQJQdyjEAAoJEK6bq3WCdh+HiPEH+wVJOMXbci4VXZjJLKuabrM8 sm2l7wdUx7ebPxm5wG05ns+9joRjtiXxXVSZWrpWtrKcTHlPWYm8iPYbnGGOi9vs NpFz+fMSncT/MIFhQBePJQkcPhEeqVEtdVc+DCXv+WfQ6MNxpbGhLj7O1mXxJOUN 5aes2i8iBVxdzEPydVApG+Fz0YDeonlh7djEKwyUZCzHJlb7ZOUiKtaXLrWM7PLc +xzMLCaBzm+srm7mo/71nD7/OKcAfR14m8gixxPkjmdWjf831Sd5yeAzZF/o3bAG RTMsZ2WKNmYqWL+KbdMTmYhF0G2eM0jYmpdkXc7zUhb85GuHJD3PDAQGTjAZkjQ= =9sT3 -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco WebEx Recording Format Player Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50905 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50905/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50905 RELEASE DATE: 2012-10-11 DISCUSS ADVISORY: http://secunia.com/advisories/50905/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50905/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50905 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco WebEx Recording Format Player, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error can be exploited to cause a buffer overflow via a specially crafted WRF file. 2) An unspecified error can be exploited to cause a buffer overflow via a specially crafted WRF file. 3) An unspecified error can be exploited to cause a buffer overflow via a specially crafted WRF file. 4) An unspecified error can be exploited to corrupt memory via a specially crafted WRF file. 5) An unspecified error can be exploited to cause a buffer overflow via a specially crafted WRF file. 6) An unspecified error can be exploited to cause a heap-based buffer overflow via a specially crafted WRF file. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the following versions: * T28 client builds prior to T28.4 (28.4) * T27 client builds prior to T27LDSP32EP10 (27.32.10) SOLUTION: Update to version 28.4 or 27.32.10. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Beyond Security, Core Security, Codenomicon, and TELUS. ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-3939 // JVNDB: JVNDB-2012-005134 // BID: 55866 // VULHUB: VHN-57220 // PACKETSTORM: 117362 // PACKETSTORM: 117325

AFFECTED PRODUCTS

vendor:ciscomodel:webex recording format playerscope:eqversion:27.32.1

Trust: 1.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.11.26

Trust: 1.6

vendor:ciscomodel:webex recording format playerscope:eqversion:28.0.0

Trust: 1.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.25.10

Trust: 1.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.21.10

Trust: 1.6

vendor:ciscomodel:webex recording format playerscope:ltversion:t28 client build

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:ltversion:t27 client build

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:eqversion:t28.4 (28.4)

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:eqversion:t27ldsp32ep10 (27.32.10)

Trust: 0.8

vendor:ciscomodel:webex t27 ld sp32 cp1scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lb sp21 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 l sp11 ep26scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 fr20scope: - version: -

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.00

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.10

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.11.8

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp28scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp25 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp21 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp11 ep23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32 cp1scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lb sp21 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 l sp11 ep26scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 fr20scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.00

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27.11.8

Trust: 0.3

vendor:ciscomodel:webex t27 sp28scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex t27 sp25 ep3scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex t27 sp23scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex t27 sp21 ep9scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex t27 sp11 ep23scope: - version: -

Trust: 0.3

sources: BID: 55866 // JVNDB: JVNDB-2012-005134 // CNNVD: CNNVD-201210-236 // NVD: CVE-2012-3939

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3939
value: HIGH

Trust: 1.0

NVD: CVE-2012-3939
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201210-236
value: CRITICAL

Trust: 0.6

VULHUB: VHN-57220
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3939
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57220
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57220 // JVNDB: JVNDB-2012-005134 // CNNVD: CNNVD-201210-236 // NVD: CVE-2012-3939

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-57220 // JVNDB: JVNDB-2012-005134 // NVD: CVE-2012-3939

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201210-236

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201210-236

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005134

PATCH

title:cisco-sa-20121010-webexurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex

Trust: 0.8

title:27109url:http://tools.cisco.com/security/center/viewAlert.x?alertId=27109

Trust: 0.8

title:cisco-sa-20121010-webexurl:http://www.cisco.com/cisco/web/support/JP/111/1116/1116639_cisco-sa-20121010-webex-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-005134

EXTERNAL IDS

db:NVDid:CVE-2012-3939

Trust: 2.9

db:BIDid:55866

Trust: 1.4

db:OSVDBid:86138

Trust: 1.1

db:SECTRACKid:1027639

Trust: 1.1

db:JVNDBid:JVNDB-2012-005134

Trust: 0.8

db:CNNVDid:CNNVD-201210-236

Trust: 0.7

db:SECUNIAid:50905

Trust: 0.7

db:CISCOid:20121010 MULTIPLE VULNERABILITIES IN THE CISCO WEBEX RECORDING FORMAT PLAYER

Trust: 0.6

db:PACKETSTORMid:117362

Trust: 0.2

db:VULHUBid:VHN-57220

Trust: 0.1

db:PACKETSTORMid:117325

Trust: 0.1

sources: VULHUB: VHN-57220 // BID: 55866 // JVNDB: JVNDB-2012-005134 // PACKETSTORM: 117362 // PACKETSTORM: 117325 // CNNVD: CNNVD-201210-236 // NVD: CVE-2012-3939

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20121010-webex

Trust: 1.8

url:http://www.securityfocus.com/bid/55866

Trust: 1.1

url:http://osvdb.org/86138

Trust: 1.1

url:http://www.securitytracker.com/id?1027639

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3939

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3939

Trust: 0.8

url:http://secunia.com/advisories/50905

Trust: 0.6

url:http://www.webex.com/

Trust: 0.3

url:http://www.coresecurity.com/content/webex-wrf-memory-corruption-vulnerability

Trust: 0.1

url:http://www.coresecurity.com/files/attachments/core_security_advisories.asc.

Trust: 0.1

url:http://www.enigmail.net/

Trust: 0.1

url:http://corelabs.coresecurity.com/

Trust: 0.1

url:http://www.webex.com/downloadplayer.html.

Trust: 0.1

url:http://www.coresecurity.com.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3939

Trust: 0.1

url:http://creativecommons.org/licenses/by-nc-sa/3.0/us/

Trust: 0.1

url:http://corelabs.coresecurity.com.

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50905

Trust: 0.1

url:http://secunia.com/advisories/50905/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/50905/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57220 // BID: 55866 // JVNDB: JVNDB-2012-005134 // PACKETSTORM: 117362 // PACKETSTORM: 117325 // CNNVD: CNNVD-201210-236 // NVD: CVE-2012-3939

CREDITS

Beyond Security, Core Security, Codenomicon, and TELUS

Trust: 0.3

sources: BID: 55866

SOURCES

db:VULHUBid:VHN-57220
db:BIDid:55866
db:JVNDBid:JVNDB-2012-005134
db:PACKETSTORMid:117362
db:PACKETSTORMid:117325
db:CNNVDid:CNNVD-201210-236
db:NVDid:CVE-2012-3939

LAST UPDATE DATE

2024-11-23T22:13:58.953000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57220date:2013-05-04T00:00:00
db:BIDid:55866date:2015-03-19T09:16:00
db:JVNDBid:JVNDB-2012-005134date:2012-10-29T00:00:00
db:CNNVDid:CNNVD-201210-236date:2012-10-29T00:00:00
db:NVDid:CVE-2012-3939date:2024-11-21T01:41:50.010

SOURCES RELEASE DATE

db:VULHUBid:VHN-57220date:2012-10-25T00:00:00
db:BIDid:55866date:2012-10-10T00:00:00
db:JVNDBid:JVNDB-2012-005134date:2012-10-29T00:00:00
db:PACKETSTORMid:117362date:2012-10-13T00:01:39
db:PACKETSTORMid:117325date:2012-10-11T10:07:14
db:CNNVDid:CNNVD-201210-236date:2012-10-16T00:00:00
db:NVDid:CVE-2012-3939date:2012-10-25T14:55:03.717