lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed,  6 May 2015 12:23:16 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability

Advisory ID: cisco-sa-20150506-ucsc

Revision 1.0

For Public Release 2015 May 6 16:00 UTC (GMT)

+----------------------------------------------------------------------

Summary
=======

A vulnerability in the web framework of Cisco UCS Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device.

The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=8KjF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ