FYI...
>
http://tools.cisco.c...cationListing.x
Cisco Firewall Services Module
-
http://tools.cisco.c...a-20121010-fwsm
2012 October 10
Summary: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is affected by the following vulnerabilities:
DCERPC Inspection Buffer Overflow Vulnerability
DCERPC Inspection Denial Of Service Vulnerabilities
... Exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the affected device, or to execute arbitrary commands. Repeated exploitation could result in a denial of service (DoS) condition.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities...
>
http://www.securityt....com/id/1027640
CVE Reference: CVE-2012-4661, CVE-2012-4662, CVE-2012-4663
Oct 10 2012
-
https://secunia.com/advisories/50857/
Release Date: 2012-10-11
Criticality level: Moderately critical
Impact: DoS, System access
Where: From local network
Software: Cisco Firewall Services Module (FWSM) 4.x
CVE Reference(s): CVE-2012-4661, CVE-2012-4662, CVE-2012-4663
... vulnerability affects versions prior to 4.1(7).
Solution: Update to version 4.1(9).
Cisco WebEx Recording Format Player
-
http://tools.cisco.c...-20121010-webex
2012 October 10
Summary: The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user... If the Cisco WebEx WRF Player was automatically installed, it will be automatically upgraded to the latest, nonvulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the Cisco WebEx WRF Player was manually installed, users will need to manually install a new version of the Cisco WebEx WRF Player after downloading the latest version from
http://www.webex.com...-recording.html . Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities...
>
http://www.securityt....com/id/1027639
CVE Reference: CVE-2012-3936, CVE-2012-3937, CVE-2012-3938, CVE-2012-3939, CVE-2012-3940, CVE-2012-3941
Oct 10 2012
Impact: Execution of arbitrary code via network, User access via network
Solution: The vendor has issued a fix (27.32.10 (T27LDSP32EP10), 28.4 (T28.4))...
-
https://secunia.com/advisories/50905/
Release Date: 2012-10-11
Criticality level:
Highly critical
Impact: System access
Where: From remote...
Software: WebEx Recording Format Player
CVE Reference(s): CVE-2012-3936, CVE-2012-3937, CVE-2012-3938, CVE-2012-3939, CVE-2012-3940, CVE-2012-3941
Solution: Update to version 28.4 or 27.32.10.
Cisco ASA 5500 Series Adaptive Security Appliances / Catalyst 6500 Series ASA Services Module
-
http://tools.cisco.c...sa-20121010-asa
2012 October 10
Summary: Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco Catalyst 6500 Series ASA Services Module (ASASM) may be affected by the following vulnerabilities:
DHCP Memory Allocation Denial of Service Vulnerability
SSL VPN Authentication Denial of Service Vulnerability
SIP Inspection Media Update Denial of Service Vulnerability
DCERPC Inspection Buffer Overflow Vulnerability
Two DCERPC Inspection Denial Of Service Vulnerabilities...
Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities...
>
http://www.securityt....com/id/1027641
CVE Reference: CVE-2012-4643, CVE-2012-4659, CVE-2012-4660, CVE-2012-4661, CVE-2012-4662, CVE-2012-4663
Oct 10 2012
Impact: Denial of service via network, Execution of arbitrary code via network, User access via network
Solution: The vendor has issued a fix (7.2(5.8), 8.0(5.28), 8.1(2.56), 8.2(5.33), 8.3(2.34), 8.4(4.5), 8.5(1.14), 8.6(1.5))...
-
https://secunia.com/advisories/50871/
Release Date: 2012-10-11
Criticality level: Moderately critical
Impact: DoS, System access
Where: From remote
Operating System: Cisco Adaptive Security Appliance (ASA) 7.x - 8.x, Cisco ASA 5500 Series Adaptive Security Appliances
CVE Reference(s): CVE-2012-4643, CVE-2012-4659, CVE-2012-4660, CVE-2012-4661, CVE-2012-4662, CVE-2012-4663
For more information:
https://secunia.com/SA50857/
Solution: Update to version 7.2(5.8), 8.0(5.28), 8.1(2.56), 8.2(5.33), 8.3(2.34), 8.4(4.5), 8.5(1.14), or 8.6(1.5)...
Edited by AplusWebMaster, 11 October 2012 - 08:32 AM.