lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 24 Apr 2013 12:03:08 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified Computing System 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Multiple Vulnerabilities in Cisco Unified Computing System

Advisory ID: cisco-sa-20130424-ucsmulti

Revision 1.0

For Public Release 2013 April 24 16:00  UTC (GMT)
+---------------------------------------------------------------------

Summary
=======

Managed and standalone Cisco Unified Computing System (UCS) deployments contain one or more of the vulnerabilities:

  * Cisco Unified Computing System LDAP User Authentication Bypass Vulnerability
  * Cisco Unified Computing System IPMI Buffer Overflow Vulnerability
  * Cisco Unified Computing Management API Denial of Service Vulnerability
  * Cisco Unified Computing System Information Disclosure Vulnerability
  * Cisco Unified Computing System KVM Authentication Bypass Vulnerability

Cisco has released free software updates that address these vulnerabilities.  These vulnerabilities affect only Cisco UCS.  Additional vulnerabilities that affect the NX-OS base operating system of UCS are described in Multiple Vulnerabilities in Cisco NX-OS-Based Products.


This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlF2hvUACgkQUddfH3/BbTrhHAD/c+Yr53D5RzalE4XWq08KKPjb
GW4lA2LX+c6XA7lE3OkA/jHUbJ1303190tX/Xxv5+cSgnQoRBtFwtrIjzOWhcKz/
=l15l
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ