Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Cisco advisories/updates


  • Please log in to reply
332 replies to this topic

#46 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 August 2010 - 07:41 PM

FYI...

- http://www.cisco.com...es_listing.html

- http://tools.cisco.c...y/center/home.x

- http://tools.cisco.c...viewAllSearch.x

Cisco ACE vuln - update available
- http://www.cisco.com...00811-ace.shtml
2010 August 11 - "The Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine contain the following DoS vulnerabilities:
• Real-Time Streaming Protocol (RTSP) inspection DoS vulnerability
• HTTP, RTSP, and Session Initiation Protocol (SIP) inspection DoS vulnerability
• Secure Socket Layer (SSL) DoS vulnerability
• SIP inspection DoS vulnerability
Cisco has released free software updates for affected customers. Workarounds that mitigate some of the vulnerabilities are available.
Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another..."

Cisco WCS SQL Injection - update available
- http://www.cisco.com...00811-wcs.shtml
2010 August 11 - "Cisco Wireless Control System (WCS) contains a SQL injection vulnerability that could allow an authenticated attacker full access to the vulnerable device, including modification of system configuration; create, modify and delete users; or modify the configuration of wireless devices managed by WCS. Cisco has released free software updates that address this vulnerability. There are no workarounds for this vulnerability..."

Cisco IOS TCP vuln
- http://secunia.com/advisories/40958/
Release Date: 2010-08-13
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Operating System: Cisco IOS 15.0
CVE Reference: CVE-2010-2827
Original Advisory:
- http://www.cisco.com...00812-tcp.shtml

- http://securitytrack...ug/1024322.html
- http://securitytrack...ug/1024321.html
- http://securitytrack...ug/1024335.html

:ph34r:

Edited by AplusWebMaster, 13 August 2010 - 04:08 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#47 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 August 2010 - 04:37 AM

FYI...

- http://www.cisco.com...es_listing.html

Cisco UCM updated
- http://secunia.com/advisories/41100/
Release Date: 2010-08-26
Criticality level: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: Cisco Unified Communications Manager 6.x, 7.x, 8.x
CVE Reference(s): CVE-2010-2837, CVE-2010-2838
Original Advisory: cisco-sa-20100825-cucm:
http://www.cisco.com...0825-cucm.shtml

Cisco Unified Presence updated
- http://secunia.com/advisories/41070/
Release Date: 2010-08-26
Criticality level: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: Cisco Unified Presence 6.x, Cisco Unified Presence 7.x
CVE Reference(s): CVE-2010-2839, CVE-2010-2840
... The vulnerabilities are reported in versions prior to 6.0( 7 ) and 7.0( 8 ).
Solution: Update to version 6.0( 7 ) or 7.0( 8 ).
Original Advisory: cisco-sa-20100825-cup:
http://www.cisco.com...00825-cup.shtml

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#48 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 30 August 2010 - 05:21 AM

FYI...

- http://www.cisco.com...es_listing.html

Cisco IOS XR Software BGP vuln
- http://secunia.com/advisories/41190/
Release Date: 2010-08-30
Criticality level: Moderately critical
Impact: DoS
Where: From remote
Operating System: Cisco IOS XR 3.x
CVE Reference: http://web.nvd.nist....d=CVE-2010-3035
Original Advisory:
- http://www.cisco.com...00827-bgp.shtml
Revision 1.4 - Last Updated 2010 September 01 "... Impact: Successful exploitation of these vulnerabilities may result in the continuous resetting of BGP peering sessions. This may lead to routing inconsistencies and a denial of service for those affected networks..."
http://www.cisco.com....html#wp1118699

- http://securitytrack...ug/1024371.html
Aug 28 2010

:ph34r:

Edited by AplusWebMaster, 01 September 2010 - 09:25 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#49 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 08 September 2010 - 11:11 AM

FYI...

- http://www.cisco.com...es_listing.html

Cisco Applied Mitigation Bulletins
- http://tools.cisco.c...ter/searchAIR.x
Last updated: 08 Sep 2010

Cisco Wireless LAN Controllers - multiple vulns...
- http://cisco.com/war...00908-wlc.shtml
2010 September 08 - "Summary:
The Cisco Wireless LAN Controller (WLC) product family is affected by these vulnerabilities:
• Two denial of service (DoS) vulnerabilities
• Three privilege escalation vulnerabilities
• Two access control list (ACL) bypass vulnerabilities
Note: These vulnerabilities are independent of one another. A device may be affected by one vulnerability and not affected by another.
Cisco has released free software updates that address these vulnerabilities.
There are no workarounds to mitigate these vulnerabilities..."
(See "Affected Products" and "Software Versions and Fixes"...)

- http://secunia.com/advisories/41357/
Release Date: 2010-09-09
Impact: Security Bypass, Privilege escalation, DoS
Where: From local network
... The vulnerabilities are reported in the following products:
* Cisco 2000 Series WLCs
* Cisco 2100 Series WLCs
* Cisco 4100 Series WLCs
* Cisco 4400 Series WLCs
* Cisco 5500 Series WLCs
* Cisco Wireless Services Modules (WiSMs)
* Cisco WLC Modules for Integrated Services Routers (ISRs)
* Cisco Catalyst 3750G Integrated WLCs
Solution: Update to a fixed version (Please see vendor's advisory for details).
Original Advisory: cisco-sa-20100908-wlc:
http://www.cisco.com...00908-wlc.shtml

- http://securitytrack...ep/1024408.html
Sep 8 2010

:ph34r:

Edited by AplusWebMaster, 09 September 2010 - 09:02 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#50 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 September 2010 - 04:18 AM

FYI...

Summary of Cisco IOS Software Bundled Advisories, September 22, 2010
- http://www.cisco.com...080b4a315.shtml

- http://www.cisco.com..._ERP_sep10.html

- http://www.securityt....com/id?1024470
- http://www.securityt....com/id?1024471
- http://www.securityt....com/id?1024472
- http://www.securityt....com/id?1024473
- http://www.securityt....com/id?1024474
- http://www.securityt....com/id?1024475
Sep 22 2010

- http://secunia.com/advisories/41437/
- http://secunia.com/advisories/41513/
- http://secunia.com/advisories/41539/
- http://secunia.com/advisories/41549/
- http://secunia.com/advisories/41551/
- http://secunia.com/advisories/41552/
2010-09-23

:ph34r:

Edited by AplusWebMaster, 23 September 2010 - 07:38 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#51 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 October 2010 - 07:00 AM

FYI...

CiscoWorks vuln - updates available
- http://www.cisco.com...101027-cs.shtml
2010 October 27 - "CiscoWorks Common Services for both Oracle Solaris and Microsoft Windows contains a vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on a host device with privileges of a system administrator. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability..."

- http://www.cisco.com...es_listing.html

- http://secunia.com/advisories/42011/
Release Date: 2010-10-28
Criticality level: Moderately critical
Impact: System access
Where: From local network
CVE Reference: CVE-2010-3036
Solution: Upgrade to Common Services version 4.0 or apply patches.
Original Advisory: Cisco:
http://www.cisco.com...101027-cs.shtml

- http://www.securityt....com/id?1024646
Oct 27 2010

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#52 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 08 November 2010 - 06:48 AM

FYI...

- http://www.cisco.com...es_listing.html

CiscoWorks Common Services vuln - updates available
- http://www.cisco.com...101027-cs.shtml
Revision 1.2 - Updated: Nov 05, 2010 - "CiscoWorks Common Services for both Oracle Solaris and Microsoft Windows contains a vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on a host device with privileges of a system administrator. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. Mitigations that limit the attack surface of this vulnerability are available... The vulnerability could be exploited over TCP port 443 or 1741.
Note: The default HTTP and HTTPS ports can be reconfigured on the server.
The vulnerability affects both CiscoWorks Common Services for Oracle Solaris and Microsoft Windows..."

Cisco UCM vuln - update available
- http://secunia.com/advisories/42129/
Release Date: 2010-11-08
Impact: Privilege escalation
Solution Status: Vendor Patch
Original Advisory: Cisco:
- http://tools.cisco.c...x?alertId=21656

- http://www.securityt....com/id?1024694
Nov 8 2010
- http://www.securityt....com/id?1024693
Nov 8 2010

:ph34r: :ph34r:

Edited by AplusWebMaster, 08 November 2010 - 06:46 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#53 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 24 November 2010 - 07:20 AM

FYI...

Cisco UVC VxWorks - multiple vulns
- http://www.securityt....com/id?1024753
Nov 17 2010 - "... Solution: No solution was available at the time of this entry. The vendor has described some mitigation steps in their advisory.
The vendor's advisory is available at:
http://www.cisco.com...-cuvc.shtml#add
2010 November 17 - "... Administrators can mitigate these vulnerabilities by limiting access to Cisco UVC web server to trusted hosts by disabling FTP, SSH, and Telnet services and by setting the "Security mode" field in the "Security" section of the Cisco UVC web GUI to "Maximum"..."

- http://www.cisco.com....html#wp1690479

- http://secunia.com/advisories/42248/
Release Date: 2010-11-18
Impact: Hijacking, Exposure of sensitive information, Privilege escalation, System access
Where: From local network
Solution Status: Unpatched ...
CVE Reference(s):
- http://web.nvd.nist....d=CVE-2010-3037
Last revised: 11/23/2010
CVSS v2 Base Score: 8.5 (HIGH)
- http://web.nvd.nist....d=CVE-2010-3038
Last revised: 11/23/2010
CVSS v2 Base Score: 10.0 (HIGH)

:ph34r: :ph34r:

Edited by AplusWebMaster, 27 November 2010 - 11:22 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#54 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 17 January 2011 - 06:19 PM

FYI...

Cisco IOS multiple flaws...
- http://www.securityt....com/id?1024964
Jan 17 2011
CVE Reference: CVE-2009-5038, CVE-2009-5039, CVE-2009-5040, CVE-2010-4671, CVE-2010-4683, CVE-2010-4684, CVE-2010-4685, CVE-2010-4686, CVE-2010-4687
Solution: The vendor has issued a fix (15.0(1)XA5)...
- http://secunia.com/advisories/42917/
-- http://www.cisco.com..._XA/rn800xa.pdf

Cisco ASA multiple flaws...
- http://www.securityt....com/id?1024963
Jan 17 2011
CVE Reference: CVE-2009-5037, CVE-2010-4670, CVE-2010-4672, CVE-2010-4673, CVE-2010-4674, CVE-2010-4675, CVE-2010-4676, CVE-2010-4677, CVE-2010-4678, CVE-2010-4679, CVE-2010-4680, CVE-2010-4681, CVE-2010-4682, CVE-2010-4688, CVE-2010-4689, CVE-2010-4690, CVE-2010-4691
Solution: The vendor has issued a fix (8.3(2))...
- http://secunia.com/advisories/42931/
-- http://www.cisco.com...es/asarn82.html
-- http://www.cisco.com...es/asarn83.html
- http://secunia.com/advisories/42942/
-- http://www.cisco.com...es/asarn82.html

- http://www.cisco.com...es_listing.html
___

- http://web.nvd.nist....d=CVE-2011-0935
Last revised:04/14/2011
"... PKI functionality in Cisco IOS 15.0 and 15.1... different vulnerability than CVE-2010-4685*..."
CVSS v2 Base Score: 10.0 (HIGH)
CVSS score derived from:

http://www.cisco.com...ts_15_1_2s.html

* http://web.nvd.nist....d=CVE-2010-4685

:ph34r:

Edited by AplusWebMaster, 20 April 2011 - 06:33 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#55 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 January 2011 - 08:30 PM

FYI...

Cisco Content Services Gateway - updates available
- http://secunia.com/advisories/43052/
Release Date: 2011-01-26
Criticality level: Moderately critical
Impact: Security Bypass, DoS
Where: From remote
CVE Reference(s): CVE-2011-0348, CVE-2011-0349, CVE-2011-0350
Solution/Original Advisory: cisco-sa-20110126-csg2:
http://www.cisco.com...080b6791d.shtml

- http://www.cisco.com...es_listing.html

- http://www.securityt....com/id/1024992
Jan 26 2011

:ph34r:

Edited by AplusWebMaster, 28 January 2011 - 04:32 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#56 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 03 February 2011 - 06:02 AM

FYI...

- http://www.cisco.com...es_listing.html

Cisco / Tandberg E, EX and C Series Endpoints vuln...
- http://www.cisco.com...080b69541.shtml
2011 February 2 - "... Tandberg devices are part of the Cisco TelePresence Systems that provide Cisco TelePresence endpoints for immersive environments, conference rooms, individual desktops and home offices. The C Series Endpoints are typically deployed as Multipurpose Room Systems and the E/EX Personal Video units are desktop devices. These devices contain a root user that is enabled for advanced debugging that is unnecessary during normal operations. The root account is not the same as the admin and user accounts. The root user is enabled by default in software versions prior to TC 4.0.0. The default configuration prior to TC 4.0.0 does not set a password for the root user. When a device is upgraded to TC 4.0.0, the root user is disabled. System software for Tandberg C Series Endpoints and E/EX Personal Video units is available for download at:
http://www.tandberg....ownload.jsp?t=2
For instructions on how to set a root password or disable the root user on other software versions, see the workaround section of this advisory. This vulnerability has been assigned the CVE ID CVE-2011-0354..."
- http://secunia.com/advisories/43158/
Release Date: 2011-02-03
Criticality level: Moderately critical
Impact: System access
Where: From local network
... The security issue is reported in versions prior to TC 4.0.0...

- http://www.securityt....com/id/1025017
Feb 2 2011
___

Cisco WebEx player vulns...
- http://www.cisco.com...201-webex.shtml
2011 February 1 - "Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system of a targeted user... Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur... These vulnerabilities have been assigned the following Common Vulnerabilities and Exposures (CVE) identifiers: CVE-2010-3269, CVE-2010-3041, CVE-2010-3042, CVE-2010-3043, CVE-2010-3044
...If a recording player was automatically installed, it will be automatically upgraded to the latest, nonvulnerable version when users access a recording file that is hosted on a WebEx server. If a WebEx recording player was manually installed, users will need to manually install a new version of the player after downloading the latest version from http://www.webex.com...loadplayer.html ..."
- http://secunia.com/advisories/43122/
Last Update: 2011-02-03
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution: Update to build T27LC SP22 and T27LB SP21 EP3...

- http://www.securityt....com/id/1025015
- http://www.securityt....com/id/1025016
Feb 1 2011

:ph34r: :ph34r:

Edited by AplusWebMaster, 03 February 2011 - 06:39 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#57 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 February 2011 - 02:55 PM

FYI...

Cisco - multiple advisories - 23-Feb-2011
- http://www.cisco.com...es_listing.html
___

Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances
- http://www.cisco.com...080b6e14d.shtml

Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability
- http://www.cisco.com...080b6e148.shtml

Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices
- http://www.cisco.com...080b6e152.shtml

Multiple Vulnerabilities in Cisco TelePresence Recording Server
- http://www.cisco.com...080b6e11d.shtml

Multiple Vulnerabilities in Cisco TelePresence Manager
- http://www.cisco.com...080b6e14f.shtml

Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch
- http://www.cisco.com...080b6e14e.shtml
23-Feb-2011
___

- http://www.securityt....com/id/1025108
- http://www.securityt....com/id/1025109
- http://www.securityt....com/id/1025112
- http://www.securityt....com/id/1025113
- http://www.securityt....com/id/1025114
23-Feb-2011
- http://www.securityt....com/id/1025118
Feb 24 2011

- http://secunia.com/advisories/43451/
- http://secunia.com/advisories/43453/
- http://secunia.com/advisories/43458/
- http://secunia.com/advisories/43488/
2011-02-24

- http://atlas.arbor.net/briefs/
February 24, 2011

:ph34r: :ph34r: :ph34r:

Edited by AplusWebMaster, 28 February 2011 - 10:46 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#58 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 30 March 2011 - 05:05 PM

FYI...

- http://www.cisco.com...es_listing.html

Cisco Network Access Control Guest Server System vuln
- http://www.cisco.com...10330-nac.shtml
2011 March 30 - "Cisco Network Access Control (NAC) Guest Server system software contains a vulnerability in the RADIUS authentication software that may allow an unauthenticated user to access the protected network.
Cisco has released free software updates that address this vulnerability... This vulnerability may result in authentication bypass without requiring a valid username or password..."
CVE-2011-0963
- http://www.securityt....com/id/1025272
Mar 30 2011

Cisco Secure Access Control System Unauthorized Password Change vuln
- http://www.cisco.com...10330-acs.shtml
2011 March 30 - "A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account to any value without providing the account's previous password. Successful exploitation requires the user account to be defined on the internal identity store.
This vulnerability does not allow an attacker to perform any other changes to the ACS database. That is, an attacker cannot change access policies, device properties, or any account attributes except the user password.
Cisco has released free software updates that address this vulnerability. There is no workaround for this vulnerability..."
CVE-2011-0951
Identifying and Mitigating Exploitation of the Cisco Secure Access Control System Unauthorized Password Change vuln
- http://www.cisco.com...10330-acs.shtml
2011 March 30

- http://www.securityt....com/id/1025271
Mar 30 2011
___

- http://isc.sans.edu/...l?storyid=10627
Last Updated: 2011-04-01 14:38:48 UTC ...(Version: 2)
"Update: Cisco PSIRT have provided the following information. Only users configured on one of the ACS internal identity stores are vulnerable. Users configured for administration of the ACS are -not- vulnerable. Users configured on external identity stores are -not- vulnerable."
- http://www.cisco.com/go/psirt/

:ph34r: :ph34r:

Edited by AplusWebMaster, 01 April 2011 - 12:56 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#59 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 April 2011 - 07:50 AM

FYI...

Cisco Wireless LAN vuln...
- http://secunia.com/advisories/44384/
Release Date: 2011-04-28
Impact: DoS
Where: From local network
CVE Reference: CVE-2011-1613
Solution: Update to a fixed version
Original Advisory:
http://www.cisco.com...10427-wlc.shtml

Cisco Unified Communications Manager multiple vulns...
- http://secunia.com/advisories/44331/
Release Date: 2011-04-28
Impact: Manipulation of data, DoS, System access
Where: From local network
CVE Reference(s): CVE-2011-1604, CVE-2011-1605, CVE-2011-1606, CVE-2011-1607, CVE-2011-1609, CVE-2011-1610
Original Advisory:
http://www.cisco.com...0427-cucm.shtml

- http://www.securityt....com/id/1025448
- http://www.securityt....com/id/1025449
Apr 27 2011

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#60 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 19 May 2011 - 07:25 AM

FYI...

Cisco UOM multiple vulns - updates available
- http://www.securityt....com/id/1025543
May 18 2011
CVE Reference: CVE-2011-0959, CVE-2011-0960, CVE-2011-0961, CVE-2011-0962, CVE-2011-0966
Impact: Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Version(s): 8.0, 8.5; possibly other versions
Impact: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Cisco Unified Operations Manager software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
A remote user can execute SQL commands on the underlying database.
A remote user can view files on the target system.
Solution: The vendor has issued a fix (8.6).
The vendor's advisories are available at:
http://tools.cisco.c...x?alertId=23085
http://tools.cisco.c...x?alertId=23086
http://tools.cisco.c...x?alertId=23088
http://tools.cisco.c...x?alertId=23087
http://tools.cisco.c...x?alertId=23089
___

- http://secunia.com/advisories/44597/ - CVE-2011-0961
- http://secunia.com/advisories/44645/ - CVE-2011-0959, CVE-2011-0960, CVE-2011-0962
- http://secunia.com/advisories/44646/ - CVE-2011-0966
2011-05-19

:ph34r: :ph34r:

Edited by AplusWebMaster, 19 May 2011 - 11:05 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



3 user(s) are reading this topic

0 members, 3 guests, 0 anonymous users