[<prev] [next>] [day] [month] [year] [list]
Message-id: <20130123111305.cisco-sa-20130123-wlc@psirt.cisco.com>
Date: Wed, 23 Jan 2013 11:13:14 -0500
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Advisory ID: cisco-sa-20130123-wlc
Revision 1.0
For Public Release 2013 January 23 16:00 UTC (GMT)
- ----------------------------------------------------------------------
Summary
=======
The Cisco Wireless LAN Controller (Cisco WLC) product family is
affected by the following four vulnerabilities:
Cisco Wireless LAN Controllers Wireless Intrusion Prevention
System (wIPS) Denial of Service Vulnerability
Cisco Wireless LAN Controllers Session Initiation Protocol Denial
of Service Vulnerability
Cisco Wireless LAN Controllers HTTP Profiling Remote Code
Execution Vulnerability
Cisco Wireless LAN Controllers SNMP Unauthorized Access
Vulnerability
Cisco has released free software updates that address these
vulnerabilities. Workarounds that mitigate these vulnerabilities are
available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlD/9LgACgkQUddfH3/BbTqd2AEAjfwbSyTP5MOkZpmjQ/7ROsgt
cxqqo3ApRtSkrqQ8QIYA/0U7bOtjGo6TyrU8P/XRmTYHUR4pnJzcAY15nULCBXzM
=kd2V
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists