Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Cisco advisories/updates


  • Please log in to reply
332 replies to this topic

#61 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 25 May 2011 - 11:14 AM

FYI...

5 Cisco security advisories released
- http://isc.sans.edu/...date=2011-05-25


- http://www.cisco.com...es_listing.html
25-May-2011
Cisco Content Delivery System Internet Streamer: Web Server Vuln
- http://www.cisco.com...525-spcdn.shtml
Cisco RVS4000 and WRVS4400N Web Management Interface Vuln
- http://www.cisco.com...5-rvs4000.shtml
Cisco IOS XR Software IP Packet Vuln
- http://www.cisco.com...525-iosxr.shtml
Cisco XR 12000 Series Shared Port Adapters Interface Processor Vuln
- http://www.cisco.com...-iosxrspa.shtml
Cisco IOS XR Software SSHv1 Denial of Service Vuln
- http://www.cisco.com...iosxr-ssh.shtml
___

- http://www.securityt....com/id/1025564
- http://www.securityt....com/id/1025565
- http://www.securityt....com/id/1025566
- http://www.securityt....com/id/1025567
- http://www.securityt....com/id/1025568
May 25 2011

:ph34r:

Edited by AplusWebMaster, 25 May 2011 - 03:26 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#62 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 01 June 2011 - 01:40 PM

FYI...

Cisco - multiple security advisories...
> http://www.cisco.com...es_listing.html

Default Credentials Vulnerability in Cisco Network Registrar
- http://www.cisco.com...10601-cnr.shtml

Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series
- http://www.cisco.com...601-phone.shtml

Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
- http://www.cisco.com...110601-ac.shtml

Default Credentials for root Account on the Cisco Media Experience Engine 5600
- http://www.cisco.com...10601-mxe.shtml
___

- http://www.securityt....com/id/1025588
- http://www.securityt....com/id/1025589
- http://www.securityt....com/id/1025590
- http://www.securityt....com/id/1025591
Jun 1 2011

:ph34r: :ph34r:

Edited by AplusWebMaster, 01 June 2011 - 03:21 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#63 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 07 July 2011 - 05:00 AM

FYI...

Cisco Content Services Gateway DoS vuln
- http://secunia.com/advisories/45148/
Release Date: 2011-07-07
Impact: DoS
Where: From local network
CVE Reference: CVE-2011-2064
Original Advisory:
http://www.cisco.com...10706-csg.shtml
2011 July 06

- http://www.cisco.com...es_listing.html

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#64 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 July 2011 - 03:51 AM

FYI...

- http://www.cisco.com...es_listing.html

Cisco ASR 9000 Series Routers...
- http://www.cisco.com...720-asr9k.shtml
2011 July 20
Cisco 9000 Series Aggregation Services Routers (ASR) running Cisco IOS XR Software version 4.1.0 contain a vulnerability that may cause a network processor in a line card to lock up while processing an IP version 4 (IPv4) packet. As a consequence of the network processor lockup, the line card that is processing the offending packet will automatically reload. Cisco has released a free software maintenance upgrade (SMU) to address this vulnerability...

Cisco SA 500 Series Security Appliances
- http://www.cisco.com...720-sa500.shtml
2011 July 20
Cisco SA 500 Series Security Appliances are affected by two vulnerabilities on their web-based management interface. An attacker must have valid credentials for an affected device to exploit one vulnerability; exploitation of the other does not require authentication. Both vulnerabilities can be exploited over the network. Cisco has released free software updates that address these vulnerabilities...
___

- http://www.securityt....com/id/1025810
Jul 20 2011
- http://www.securityt....com/id/1025811
Jul 20 2011

:ph34r: :ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#65 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 29 July 2011 - 01:40 PM

FYI...

- http://www.us-cert.g...ty_advisory_and
July 31, 2011 at 08:21 pm
___

- http://www.cisco.com...es_listing.html

Cisco mitigation Bulletin: Default credentials - Root Account - TelePresence Recording Svr
- http://www.cisco.com...110729-tp.shtml
29-Jul-2011 - "Cisco TelePresence Recording Server Software Release 1.7.2.0 includes a root administrator account that is enabled by default. Successful exploitation of the vulnerability could allow a remote attacker to use these default credentials to modify the system configuration and settings...
CVE Reference: CVE-2011-2555
Workarounds: A workaround exists to mitigate and fix this vulnerability. The workaround requires manual intervention on the affected system. Please contact the Cisco Technical Assistance Center (TAC) for instructions on how to implement this workaround. Customers are advised to migrate to Cisco TelePresence Recording Server software version 1.7.2.1...
Device-Specific Mitigation and Identification: Specific information about mitigation and identification is available for these devices:
Cisco IOS Routers and Switches
Cisco IOS NetFlow
Cisco ASA and FWSM Firewalls ...
Cisco has released free software updates that address this vulnerability..."
- http://tools.cisco.c...ter/searchAIR.x

- http://www.securityt....com/id/1025872
Jul 29 2011

:ph34r:

Edited by AplusWebMaster, 01 August 2011 - 05:35 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#66 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 05 August 2011 - 12:07 PM

FYI...

Cisco - infected CDs ...
- http://www.cisco.com...110803-cd.shtml
2011 August 03 - "... In the period of December 2010 until August 2011, Cisco shipped warranty CDs that contain a reference to a third-party website known to be a malware repository. When the CD is opened with a web browser, it automatically and without warning accesses this third-party website. Additionally, on computers where the operating system is configured to automatically open inserted media, the computer's default web browser will access the third-party site when the CD is inserted, without requiring any further action by the user... the third-party site in question is currently -inactive- as a malware repository, so customers are not in immediate danger of having their computers compromised. However, if this third-party web site would become active as a malware repository again, there is a potential that users could infect their operating system by opening the CD with their web browser. All warranty CDs printed with "Revision -F0" (or later) do not contain references to the third-party website and do not introduce a potential to compromise customers' computers... Although there are no distinguishable markings on the CDs, all warranty CDs shipped in the period of December 2010 through August 2011 do contain a reference to the third-party site..."
(More detail available at the Cisco URL above.)
___

- http://www.securityt....com/id/1025883
Aug 3 2011

- https://isc.sans.edu...l?storyid=11302
Last Updated: 2011-08-03

- http://www.theregist...ary_cd_warning/
5 August 2011

:( :ph34r: :ph34r:

Edited by AplusWebMaster, 08 August 2011 - 01:21 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#67 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 24 August 2011 - 06:09 AM

FYI...

Cisco IOS Login...
- http://www.securityt....com/id/1025964
Aug 23 2011
CVE Reference: CVE-2011-1624
... A remote user can cause the target device to reload.
Solution: The vendor has issued a fix (12.2(58)SE1).
... advisory is available at:
http://tools.cisco.c...ugId=CSCto62631

Cisco IOS Data-Link Switching...
- http://www.securityt....com/id/1025965
Aug 23 2011
CVE Reference: CVE-2011-1625
... A remote user can the target device to crash and reload.
Solution: The vendor has issued a fix (12.2(33)SCF).
The vendor's advisory is available at:
http://tools.cisco.c...ugId=CSCtf74999

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#68 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 25 August 2011 - 06:46 AM

FYI...

> http://www.cisco.com...es_listing.html

Cisco Intercompany Media Engine...
- http://www.securityt....com/id/1025969
Aug 24 2011
CVE Reference: CVE-2011-2563, CVE-2011-2564
Impact: Denial of service via network
Version(s): 8.0.x...
Solution: The vendor has issued a fix (8.5(1)), available at:
http://www.cisco.com...10824-ime.shtml]

Cisco Unified Communications Manager...
1. http://www.securityt....com/id/1025970
Aug 24 2011
CVE Reference: CVE-2011-2560, CVE-2011-2561, CVE-2011-2562, CVE-2011-2563, CVE-2011-2564
Impact: Denial of service via network
Version(s): 4.x, 6.x, 7.x, 8.x
Solution: The vendor has issued a fix (6.1(5)SU3, 7.1(5b)SU4, 8.0(3a)SU2, 8.5(1)SU2, 8.6(1))... available at:
http://www.cisco.com...0824-cucm.shtml

Cisco Unified Communications Manager...
2. http://www.securityt....com/id/1025971
Aug 24 2011
CVE Reference: CVE-2011-1643
Impact: Disclosure of authentication information, Disclosure of system information, Disclosure of user information
Version(s): 6.x, 7.x, 8.0, 8.5
Solution: The vendor has issued a fix. A patch matrix is available... at:
http://www.cisco.com...cucm-cups.shtml

Cisco Unified Presence...
- http://www.securityt....com/id/1025972
Aug 24 2011
CVE Reference: CVE-2011-1643
Impact: Disclosure of authentication information, Disclosure of system information, Disclosure of user information
Version(s): 6.x, 7.x, 8.0, 8.5
Solution: The vendor has issued a fix. A patch matrix is available... at:
http://www.cisco.com...cucm-cups.shtml
___

- https://www.us-cert....ity_advisories4
August 25, 2011
___

- https://secunia.com/advisories/45738/
- https://secunia.com/advisories/45741/
- https://secunia.com/advisories/45743/
- https://secunia.com/advisories/45772/
2011-08-25

:ph34r: :ph34r:

Edited by AplusWebMaster, 25 August 2011 - 02:48 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#69 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 01 September 2011 - 05:50 AM

FYI...

Cisco TelePresence vuln - update available
- http://www.securityt....com/id/1025994
Aug 31 2011
CVE Reference: http://web.nvd.nist....d=CVE-2011-2577
Impact: A remote user can cause the target device to crash.
Solution: The vendor has issued a fix (TC 4.0.0, F9.1).
... vendor's advisory is available at:
http://www.cisco.com...-tandberg.shtml

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#70 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 September 2011 - 09:20 PM

FYI...

- http://www.cisco.com...es_listing.html

CiscoWorks LAN Management Solution vuln
- http://www.cisco.com...10914-lms.shtml
Revision 1.1 - Updated 2011 September 19
"Two vulnerabilities exist in CiscoWorks LAN Management Solution software that could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. Cisco has released free software updates that address these vulnerabilities. There are no workarounds available to mitigate these vulnerabilities... Both vulnerabilities are documented... and have been assigned CVE ID CVE-2011-2738..."

Cisco Unified Service Monitor and Cisco Unified Operations Manager vulns
- http://www.cisco.com...0914-cusm.shtml
2011 September 14 - "Two vulnerabilities exist in Cisco Unified Service Monitor and Cisco Unified Operations Manager software that could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. Cisco has released free software updates that address these vulnerabilities. There are no workarounds available to mitigate these vulnerabilities... Both of these vulnerabilities are documented... and have been assigned CVE ID CVE-2011-2738..."

- http://web.nvd.nist....d=CVE-2011-2738
Last revised: 09/19/2011
CVSS v2 Base Score: 10.0 (HIGH)
___

Download - Cisco Software Center
- http://www.cisco.com.../navigator.html
___

Apache HTTPd DoS vuln ...
- http://www.cisco.com...30-apache.shtml
Revision 1.6 - Updated 2011 September 15
... Mitigations that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document for this Advisory:
- http://tools.cisco.c...x?alertId=24024
___

- http://www.securityt....com/id/1026046
- http://www.securityt....com/id/1026047
- http://www.securityt....com/id/1026048
Sep 14 2011

- https://secunia.com/advisories/46016/
Release Date: 2011-09-15
Criticality level: Moderately critical
Impact: System access
Where: From local network
... CiscoWorks LAN Management Solution... vulnerabilities are reported in versions 3.1 and 3.2.
Solution: Upgrade to version 4.1.
Original Advisory: http://www.cisco.com...10914-lms.shtml

- https://secunia.com/advisories/45979/
Release Date: 2011-09-15
Criticality level: Moderately critical
Impact: System access
Where: From local network
... vulnerabilities are reported in the following products:
* CiscoWorks Prime LAN Management Solution version 4.0.
* Cisco Unified Service Monitor prior to version 8.6.
* Cisco Unified Operations Manager prior to version 8.6.
Solution: Update to a fixed version.
Original Advisory:
http://www.cisco.com...10914-lms.shtml
http://www.cisco.com...0914-cusm.shtml
___

Cisco Nexus 5000 and 3000 Series Switches vuln
- http://www.cisco.com...907-nexus.shtml
2011 September 07 - "A vulnerability exists in Cisco Nexus 5000 and 3000 Series Switches that may allow traffic to bypass deny statements in access control lists (ACLs) that are configured on the device. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability... This vulnerability is documented... and has been assigned CVE ID CVE-2011-2581..."
> http://web.nvd.nist....d=CVE-2011-2581
Original release date: 09/14/2011

:ph34r:

Edited by AplusWebMaster, 21 September 2011 - 09:28 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#71 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 September 2011 - 04:13 PM

FYI...

Semi-Annual Cisco IOS Software Security Advisory Bundled Publication
- http://www.cisco.com..._ERP_sep11.html
September 28, 2011
___

> http://www.cisco.com...es_listing.html

Cisco IOS Software IPv6over MPLS vulns
- http://www.cisco.com...-ipv6mpls.shtml
2011 September 28

Cisco IOS Software IPS and Zone-Based Firewall vulns
- http://www.cisco.com...0928-zbfw.shtml
2011 September 28

Cisco IOS Software IP Svc Level Agreement vuln
- http://www.cisco.com...928-ipsla.shtml
2011 September 28

Cisco 10000 Series DoS vuln
- http://www.cisco.com...0928-c10k.shtml
2011 September 28

Cisco IOS Software Smart Install vuln
- http://www.cisco.com...t-install.shtml
2011 September 28

Cisco UCM vuln
- http://www.cisco.com...0928-cucm.shtml
2011 September 28

Cisco IOS Software Data-Link Switching vuln
- http://www.cisco.com...0928-dlsw.shtml
2011 September 28

Cisco IOS Software NAT vulns
- http://www.cisco.com...10928-nat.shtml
2011 September 28

Cisco IOS Software IPv6 DoS vuln
- http://www.cisco.com...0928-ipv6.shtml
2011 September 28

Cisco IOS Software Session Initiation Protocol DoS vuln
- http://www.cisco.com...10928-sip.shtml
2011 September 28

Jabber Extensible Communications Platform/Cisco Unified Presence XML DoS vuln
- http://www.cisco.com...cpcupsxml.shtml
2011 September 28

:ph34r: :ph34r:

Edited by AplusWebMaster, 28 September 2011 - 11:41 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#72 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 05 October 2011 - 12:02 PM

FYI...

- http://www.cisco.com...es_listing.html

Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services multiple vulns...
- http://www.cisco.com...11005-asa.shtml
2011 October 05 - "... affected by multiple vulnerabilities as follows:
MSN Instant Messenger (IM) Inspection Denial of Service vulnerability
TACACS+ Authentication Bypass vulnerability
Four SunRPC Inspection Denial of Service vulnerabilities
Internet Locator Service (ILS) Inspection Denial of Service vulnerability..."

Cisco Firewall Services multiple vulns...
- http://www.cisco.com...1005-fwsm.shtml
2011 October 05 - "... affected by the following vulnerabilities:
Syslog Message Memory Corruption Denial of Service Vulnerability
Authentication Proxy Denial of Service Vulnerability
TACACS+ Authentication Bypass Vulnerability
Sun Remote Procedure Call (SunRPC) Inspection Denial of Service Vulnerabilities
Internet Locator Server (ILS) Inspection Denial of Service Vulnerability..."

Cisco Network Admission Control Manager Directory Traversal vuln
- http://www.cisco.com...11005-nac.shtml
2011 October 05 - "... directory traversal vulnerability that may allow an unauthenticated attacker to obtain system information. There are no workarounds to mitigate this vulnerability. Cisco has released free software updates that address this vulnerability..."
___

- http://www.securityt....com/id/1026140
CVE Reference: CVE-2011-3298, CVE-2011-3299, CVE-2011-3300, CVE-2011-3301, CVE-2011-3302, CVE-2011-3303, CVE-2011-3304
- http://www.securityt....com/id/1026141
CVE Reference: CVE-2011-3296, CVE-2011-3297, CVE-2011-3298, CVE-2011-3299, CVE-2011-3300, CVE-2011-3301, CVE-2011-3302, CVE-2011-3303
- http://www.securityt....com/id/1026142
CVE Reference: CVE-2011-3305
Oct 5 2011

:ph34r:

Edited by AplusWebMaster, 06 October 2011 - 04:14 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#73 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 October 2011 - 01:13 PM

FYI...

- http://www.cisco.com...es_listing.html

Cisco TelePresence Video Communication Svr vuln
- http://www.cisco.com...11012-vcs.shtml
Release 2011 October 12
A vulnerability exists in Cisco TelePresence Video Communication Server (VCS) due to improper validation of user-controlled input to the web-based administrative interface. User-controlled input supplied to the login page via the HTTP User-Agent header is not properly sanitized for illegal or malicious content prior to being returned to the user in dynamically generated web content. A remote attacker could exploit this vulnerability to perform reflected cross-site scripting attacks...
Cisco TelePresence Video Communication Server Software versions earlier than X7.0 are affected. This vulnerability has been corrected in Cisco TelePresence Video Communication Server Software version X7.0... CVE-2011-3294...

- http://securitytracker.com/id/1026186
CVE Reference: CVE-2011-3294
Date: Oct 13 2011
Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available: Yes Vendor Confirmed: Yes
Version: VCS prior to 7.0
Description: A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks...
___

Cisco IOS Smart Install vuln
- http://www.cisco.com...t-install.shtml
Revision 1.2
Last Updated 2011 October 11
Release 2011 September 28
Summary: A vulnerability exists in the Smart Install feature of Cisco Catalyst Switches running Cisco IOS Software that could allow an unauthenticated, remote attacker to perform remote code execution on the affected device. Cisco has released free software updates that address this vulnerability. There are no workarounds available to mitigate this vulnerability other than disabling the Smart Install feature...
___

Cisco IOS IP SLA vuln
- http://www.cisco.com...928-ipsla.shtml
Revision 1.2
Last Updated 2011 October 10
Release 2011 September 28
Summary: The Cisco IOS IP Service Level Agreement (IP SLA) feature contains a denial of service (DoS) vulnerability. The vulnerability is triggered when malformed UDP packets are sent to a vulnerable device. The vulnerable UDP port numbers depend on the device configuration. Default ports are not used for the vulnerable UDP IP SLA operation or for the UDP responder ports. Cisco has released free software updates that address this vulnerability...

:ph34r: :ph34r: :ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#74 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 October 2011 - 05:26 AM

FYI...

- http://tools.cisco.c...licationListing

CiscoWorks Common Services Arbitrary Command Execution Vulnerability
- http://tools.cisco.c...-sa-20111019-cs
October 19, 2011 - "CiscoWorks Common Services for Microsoft Windows contains a vulnerability that could allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability..."
- http://www.securityt....com/id/1026226
CVE Reference: CVE-2011-3310
Date: Oct 19 2011

Cisco Show and Share Security Vulnerabilities
- http://tools.cisco.c...sa-20111019-sns
October 19, 2011 - "The Cisco Show and Share webcasting and video sharing application contains two vulnerabilities. The first vulnerability allows an unauthenticated user to access several administrative web pages. The second vulnerability permits an authenticated user to execute arbitrary code on the device under the privileges of the web server user account. Cisco has released free software updates that address these vulnerabilities. There are no workarounds available for these vulnerabilities..."
- http://www.securityt....com/id/1026227
CVE Reference: CVE-2011-2584, CVE-2011-2585
Date: Oct 19 2011

- https://www.us-cert....rity_advisories
October 19, 2011 - "... vulnerabilities affecting CiscoWorks Common Services and Cisco Show and Share. These vulnerabilities may allow an attacker to execute arbitrary code or bypass security restrictions..."
___

CiscoWorks LAN Management Solution Remote Code Execution Vulnerabilities
- http://tools.cisco.c...sa-20110914-lms
Updated October 19, 2011 - Revision 1.2

Cisco IOS Software Data-Link Switching Vulnerability
- http://tools.cisco.c...a-20110928-dlsw
Updated October 18, 2011 - Revision 1.1

Cisco IOS Software IP Service Level Agreement Vulnerability
- http://tools.cisco.c...-20110928-ipsla
Updated October 18, 2011 - Revision 2.1

:ph34r: :ph34r:

Edited by AplusWebMaster, 21 October 2011 - 06:34 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#75 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 October 2011 - 11:16 PM

FYI...

- http://tools.cisco.c...licationListing

Cisco Unified Contact Center Express Directory Traversal Vulnerability
- http://tools.cisco.c...a-20111026-uccx
October 26, 2011 - Version 1.0

Denial of Service Vulnerability in Cisco Video Surveillance IP Cameras
- http://tools.cisco.c...20111026-camera
October 26, 2011 - Version 1.0

Cisco Security Agent Remote Code Execution Vulnerabilities
- http://tools.cisco.c...sa-20111026-csa
October 26, 2011 - Version 1.0

Buffer Overflow Vulnerabilities in the Cisco WebEx Player
- http://tools.cisco.c...-20111026-webex
October 26, 2011 - Version 1.0

- https://www.us-cert....ity_advisories4
October 26, 2011 - "... These vulnerabilities may allow an attacker to execute arbitrary code or obtain sensitive information..."
___

- Updated:

Cisco Unified Communications Manager Denial of Service Vulnerabilities
- http://tools.cisco.c...a-20110824-cucm
October 26, 2011 - Version 1.2

Cisco Unified Communications Manager Directory Traversal Vulnerability
- http://tools.cisco.c...a-20111026-cucm
October 26, 2011 - Version 1.1

Cisco IOS Software Smart Install Remote Code Execution Vulnerability
- http://tools.cisco.c...8-smart-install
October 26, 2011 - Version 1.3

:ph34r: :ph34r:

Edited by AplusWebMaster, 27 October 2011 - 06:40 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users