Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Cisco advisories/updates


  • Please log in to reply
332 replies to this topic

#31 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 24 September 2009 - 04:15 AM

FYI...

Cisco IOS multiple vulns - updates available
- http://secunia.com/advisories/36835/2/
Release Date: 2009-09-24
Critical: Moderately critical
Impact: Security Bypass, Exposure of sensitive information, DoS, System access
Where: From remote
Solution Status: Vendor Patch
OS: Cisco IOS 12.x, Cisco IOS R12.x, Cisco IOS XE 2.1.x, Cisco IOS XE 2.2.x, Cisco IOS XE 2.3.x
Solution: Update to a fixed version (please see the vendor's advisories for details)...
Original Advisory:
http://www.cisco.com...90923-cme.shtml
http://www.cisco.com...923-ipsec.shtml
http://www.cisco.com...3-tunnels.shtml
http://www.cisco.com...90923-acl.shtml
http://www.cisco.com...0923-h323.shtml
http://www.cisco.com...90923-sip.shtml
http://www.cisco.com...90923-tls.shtml
http://www.cisco.com...uth-proxy.shtml
http://www.cisco.com...23-ios-fw.shtml
http://www.cisco.com...90923-ntp.shtml
___

Cisco UCM SIP Processing DoS - updates available
- http://secunia.com/advisories/36836/2/
Release Date: 2009-09-24
Critical: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: Cisco Unified Communications Manager 5.x, Cisco Unified Communications Manager 6.x, Cisco Unified Communications Manager 7.x
Original Advisory:
http://www.cisco.com...090923-cm.shtml
___

Summary of Cisco IOS Software Bundled Advisories
- http://www.cisco.com...23-bundle.shtml
September 23, 2009

:ph34r:

Edited by AplusWebMaster, 26 September 2009 - 07:34 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#32 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 December 2009 - 10:59 PM

FYI...

Cisco WebEx WRF Player vulns
- http://www.cisco.com...216-webex.shtml
2009 December 16 - "Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) Player. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system of a targeted user. The Cisco WebEx WRF Player is an application that is used to play back WebEx meeting recordings that have been recorded on the computer of an on-line meeting attendee. The WRF Player can be automatically installed when the user accesses a WRF file that is hosted on a WebEx server... Multiple buffer overflow vulnerabilities exist in the WRF Player. The vulnerabilities may lead to a crash of the WRF Player application, or in some cases, lead to remote code execution...
(CVE) identifiers:
* CVE-2009-2875
* CVE-2009-2876
* CVE-2009-2877
* CVE-2009-2878
* CVE-2009-2879
* CVE-2009-2880 ...
There are no workarounds for the vulnerabilities disclosed in this advisory... Cisco has released free software updates that address these vulnerabilities..."

- http://isc.sans.org/...ml?storyid=7762
Last Updated: 2009-12-16 20:00:37 UTC

- http://secunia.com/advisories/37810/2/
Release Date: 2009-12-17
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch ...

:ph34r:

Edited by AplusWebMaster, 17 December 2009 - 05:57 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#33 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 January 2010 - 08:31 AM

FYI...

Cisco IOS / DoS vuln - update available
- http://secunia.com/advisories/38227/2/
Release Date: 2010-01-21
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
OS: Cisco IOS XR 3.x ...
Solution: Update to fixed versions. Please see the vendor's advisory for details.
Original Advisory: Cisco:
http://www.cisco.com...20-xr-ssh.shtml

- http://atlas.arbor.n...ndex#1942399210

Cisco InternetWork Performance Monitor GIOP Request Buffer Overflow
- http://secunia.com/advisories/38230/2/
Last Update: 2010-01-22
Critical: Moderately critical
Impact: DoS, System access
Where: From local network
Solution: Contact the vendor for instructions on migrating to non-vulnerable software
(please see the vendor advisory for details).
Restrict network access to an affected system.
Original Advisory: Cisco:
http://www.cisco.com...00120-ipm.shtml

:ph34r:

Edited by AplusWebMaster, 23 January 2010 - 08:32 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#34 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 January 2010 - 07:43 AM

FYI...

Cisco Unified MeetingPlace - multiple vulns
- http://secunia.com/advisories/38259/2/
Release Date: 2010-01-28
Critical: Moderately critical
Impact: Security Bypass, Manipulation of data, Exposure of sensitive information, Privilege escalation
Where: From remote
Solution Status: Vendor Patch
Software: Cisco Unified MeetingPlace 5.x, Cisco Unified MeetingPlace 6.x, Cisco Unified MeetingPlace 7.x
Solution: Update to the latest version.
http://tools.cisco.c...mdfid=278785523
Original Advisory:
http://www.cisco.com...100127-mp.shtml

- http://securitytrack...an/1023511.html
CVE Reference: CVE-2010-0139, CVE-2010-0140, CVE-2010-0141, CVE-2010-0142
Date: Jan 27 2010

- http://nvd.nist.gov/...e=CVE-2010-0139
- http://nvd.nist.gov/...e=CVE-2010-0140
- http://nvd.nist.gov/...e=CVE-2010-0141
- http://nvd.nist.gov/...e=CVE-2010-0142

- http://www.us-cert.g..._advisory_for16
January 28, 2010

Multiple Vulnerabilities in Cisco Unified MeetingPlace
- http://atlas.arbor.n...ndex#-478562949
Severity: Elevated Severity
Published: Friday, January 29, 2010 19:03
"Multiple issues have been found and fixed in Cisco Unified MeetingPlace versions 5, 6, and 7. These bugs could allow for SQL injection, privilege escalation, account enumeration, and unauthorized new account creation. Cisco has made updated software available to their customers to address these issues.
Analysis: Sites using Cisco Unified MeetingPlace should review this update and apply the updates soon."

:ph34r:

Edited by AplusWebMaster, 01 February 2010 - 10:01 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#35 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 02 February 2010 - 08:34 AM

FYI...

Cisco Secure Desktop vuln - update available
- http://secunia.com/advisories/38397/2/
Release Date: 2010-02-02
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch
OS: Cisco Adaptive Security Appliance (ASA) 8.x
Software: Cisco Secure Desktop 3.x
Solution: Update to fixed versions:
Cisco Secure Desktop: Update to version 3.5.
Cisco ASA 5500 Series Adaptive Security Appliances:
Update to version 8.2(1), 8.1(2.7), or 8.0(5)
Original Advisory: Cisco:
http://tools.cisco.c...x?alertId=19843

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#36 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 17 February 2010 - 04:42 PM

FYI...

Cisco releases multiple Security Advisories
- http://www.us-cert.g...rity_advisories
February 17, 2010
> http://www.cisco.com...080b1910e.shtml
Security advisory, cisco-sa-20100217-fwsm, addresses a vulnerability in the Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers. Successful and repeated exploitation of this vulnerability could result in a denial-of-service condition.
> http://www.cisco.com...080b1910c.shtml
Security advisory, cisco-sa-20100217-asa, addresses multiple vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances. These vulnerabilities may allow an attacker to gain unauthorized access to an affected system or cause a denial-of-service condition.
> http://www.cisco.com...080b1910d.shtml
Security advisory, cisco-sa-20100217-csa, addresses multiple vulnerabilities in the Cisco Security Agent. These vulnerabilities may allow an attacker to execute arbitrary SQL commands, view and download arbitrary files, or cause a denial-of-service condition...

- http://atlas.arbor.n...ndex#1477198596
February 17, 2010

Cisco PIX 500
- http://secunia.com/advisories/38636

Cisco Firewall Services Module
- http://secunia.com/advisories/38621/

Cisco ASA 5500
- http://secunia.com/advisories/38618/

:ph34r:

Edited by AplusWebMaster, 18 February 2010 - 05:39 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#37 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 04 March 2010 - 06:37 AM

FYI...

Cisco - multiple advisories...
- http://www.us-cert.g...rity_advisories
March 4, 2010

- http://secunia.com/advisories/38799/
Release Date: 2010-03-04
Criticality level: Moderately critical
Impact: Manipulation of data
Where: From remote
Solution Status: Vendor Patch
Operating System: Cisco Digital Media Player 5.x
Original Advisory:
http://www.cisco.com...00303-dmp.shtml

- http://secunia.com/advisories/38754/
Release Date: 2010-03-04
Criticality level: Moderately critical
Impact: DoS
Solution Status: Vendor Patch
Software: Cisco Unified Communications Manager 4.x, Cisco Unified Communications Manager 6.x, Cisco Unified Communications Manager 7.x
Original Advisory:
http://www.cisco.com...0303-cucm.shtml

- http://secunia.com/advisories/38824/
Software: Cisco Unified Communications Manager 5.1 reached the End of Software Maintenance on 2010-02-13...
Original Advisory:
http://www.cisco.com...0303-cucm.shtml

:ph34r:

Edited by AplusWebMaster, 04 March 2010 - 11:43 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#38 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 24 March 2010 - 08:12 PM

FYI...

Cisco - 7 security updates
- http://isc.sans.org/...ml?storyid=8488
Last Updated: 2010-03-24 22:52:39 UTC - "... information at their site:
- http://www.cisco.com...es_listing.html ..."
24-March-2010 16:00 GMT

- http://www.cisco.com...080b20ee1.shtml
2010 March 24 1600 UTC

- http://atlas.arbor.n...ndex#1182447196
March 24, 2010 - "... Cisco has released 7 security bulletins for its IOS, IOS XR, and CUCM product features, all of which are denial of service issues..."

- http://web.nvd.nist....d=CVE-2010-0584
Last revised: 03/26/2010
CVSS v2 Base Score: 7.8 (HIGH)

:ph34r:

Edited by AplusWebMaster, 28 March 2010 - 04:02 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#39 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 April 2010 - 04:26 AM

FYI...

Cisco Secure Desktop vuln - update available
- http://secunia.com/advisories/39459/
Release Date: 2010-04-15
Criticality level: Highly critical
Impact: System access
Solution Status: Vendor Patch
Software: Cisco Secure Desktop 3.x, Cisco Secure Desktop Installer ActiveX Control 1.x
CVE Reference: CVE-2010-0589
Original Advisory: Cisco:
http://www.cisco.com...00414-csd.shtml

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#40 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 May 2010 - 07:25 AM

FYI...

Cisco PGW vulns - updates available
- http://www.cisco.com...00512-pgw.shtml
2010 May 12 - "Multiple vulnerabilities exist in the Cisco PGW 2200 Softswitch series of products... Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities... All vulnerabilities listed in this Security Advisory are addressed in Cisco PGW 2200 Softswitch version 9.7(3)S11, version 9.8(1)S5, and subsequent, software releases..."

- http://www.cisco.com...es_listing.html

- http://atlas.arbor.n...dex#-1480011314
May 12, 2010 - Elevated Severity - "Analysis: This is a big set of medium risk vulnerabilities. We encourage sites using the PGW 2200 to update soon to address them."

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#41 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 27 May 2010 - 02:44 AM

FYI...

Cisco Network Building Mediator - updates available
- http://www.cisco.com...-mediator.shtml
May 26, 2010 - "These vulnerabilities affect the legacy Richards-Zeta Mediator 2500 product and Cisco Network Building Mediator NBM-2400 and NBM-4800 models. All Mediator Framework software releases prior to 3.1.1 are affected by all vulnerabilities listed in this security advisory... Fixed 3.1.1 and 3.0.9 Mediator Framework software can be downloaded from the Software Center... by visiting http://www.cisco.com...load/index.html and navigating to Physical Security and Building Systems > Smart Connected Buildings > Cisco Network Building Mediator. To obtain fixed 1.5.1 and 2.2 Mediator Framework software and configTOOL version 3.1.0b1 contact Cisco TAC... There are no workarounds for these vulnerabilities..."

- http://securitytrack...ay/1024027.html
May 26 2010

:ph34r:

Edited by AplusWebMaster, 27 May 2010 - 08:39 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#42 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 June 2010 - 05:39 AM

FYI...

Cisco Application Extension Platform (AXP) 1.1 and 1.1.5
allows local users to obtain sensitive configuration information and gain administrator privileges via unspecified API calls.
- http://web.nvd.nist....d=CVE-2010-1572
Last revised: 06/17/2010
CVSS v2 Base Score: 9.0 (HIGH)
Type: Advisory; Patch Information
- http://www.cisco.com...080b3290b.shtml

Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2)
unspecified 6.0 versions, and 5.0 before 5.0(2)SR3 allows remote attackers to read arbitrary files via a crafted bootstrap message to TCP port 6295.
- http://web.nvd.nist....d=CVE-2010-1571
Last revised: 06/17/2010
CVSS v2 Base Score: 7.8 (HIGH)
Type: Advisory; Patch Information
- http://www.cisco.com...080b2f110.shtml

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#43 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 July 2010 - 08:13 AM

FYI...

- http://www.cisco.com...0707-snmp.shtml
2010 July 07 - "Summary: Cisco Industrial Ethernet 3000 (IE 3000) Series switches running Cisco IOSŪ Software releases 12.2(52)SE or 12.2(52)SE1, contain a vulnerability where well known SNMP community names are hard-coded for both read and write access. The hard-coded community names are "public" and "private." Cisco recommends that all administrators deploy the mitigation measures outlined in the Workarounds section or perform a Cisco IOS Software upgrade... Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available...
Impact: Successful exploitation of the vulnerability could result in an attacker obtaining full control of the device..."
- http://web.nvd.nist....d=CVE-2010-1574
CVSS v2 Base Score: 10.0 (HIGH)
- http://www.kb.cert.org/vuls/id/732671
Date Last Updated: 2010-07-12

- http://www.vsecurity...ory/20100702-1/
2010-07-02 "... Cisco CSS 11500 Series Content Services Switch... implement more stringent request validation and/or corrections when receiving requests which do not utilize HTTP-compliant newlines... Three primary approaches are possible..."
- http://www.securityf.../100/0/threaded
- http://web.nvd.nist....d=CVE-2010-1575
- http://web.nvd.nist....d=CVE-2010-1576
- http://web.nvd.nist....d=CVE-2010-2629
CVSS v2 Base Score: 7.5 (HIGH)

:ph34r: :ph34r:

Edited by AplusWebMaster, 13 July 2010 - 05:50 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#44 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 22 July 2010 - 04:47 AM

FYI...

Cisco CDS vuln - update available
- http://secunia.com/advisories/40701/
Release Date: 2010-07-22
Criticality level: Moderately critical
Impact: Exposure of system information, Exposure of sensitive information
Where: From remote
Software: Cisco Content Delivery System 2.x
CVE Reference: CVE-2010-1577
... The vulnerability is reported in versions 2.2.x, 2.3.x, 2.4.x, and 2.5.x.
Solution: Update to version 2.5.7 or later.
Original Advisory: Cisco:
http://www.cisco.com...721-spcdn.shtml
Last Updated: 2010 July 29 Revision 1.1 - "Updated Details and Workaround sections..."

- http://www.cisco.com...es_listing.html
29-July-2010

- http://atlas.arbor.net/briefs/
July 23, 2010

:ph34r:

Edited by AplusWebMaster, 30 July 2010 - 09:53 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#45 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 04 August 2010 - 03:01 PM

FYI...

Multiple Cisco Advisories
- http://isc.sans.edu/...ml?storyid=9331
Last Updated: 2010-08-04 18:35:02 UTC

Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances, impact is DoS.
Advisory ID: cisco-sa-20100804-asa
http://www.cisco.com...00804-asa.shtml

- http://securitytrack...ug/1024279.html
Aug 4 2010

Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services Module, impact is DoS.
Advisory ID: cisco-sa-20100804-fwsm
http://www.cisco.com...0804-fwsm.shtml

- http://securitytrack...ug/1024280.html
Aug 4 2010

:ph34r:

Edited by AplusWebMaster, 06 August 2010 - 09:00 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



3 user(s) are reading this topic

0 members, 3 guests, 0 anonymous users