lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5602DE39.3020609@securify.nl>
Date: Wed, 23 Sep 2015 19:15:37 +0200
From: "Securify B.V." <lists@...urify.nl>
To: bugtraq@...urityfocus.com
Subject: Cisco AnyConnect elevation of privileges via DMG install script

------------------------------------------------------------------------
Cisco AnyConnect elevation of privileges via DMG install script
------------------------------------------------------------------------
Yorick Koster, July 2015

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
Cisco AnyConnect Secure Mobility Client for OS X is affected by a
vulnerability that allows local attackers to mount arbitrary DMG files
at arbitrary mount points. By exploiting this vulnerability is is
possible for the attacker to gain root privileges. Cisco reports that a
similar issue also exists in Cisco AnyConnect Secure Mobility Client for
Linux.

------------------------------------------------------------------------
See also
------------------------------------------------------------------------
- CVE-2015-6306
- http://tools.cisco.com/security/center/viewAlert.x?alertId=41135

------------------------------------------------------------------------
Tested version
------------------------------------------------------------------------
This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for OS X version 3.1.08009.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
There is currently no fix available. Updates are expected to be released
on September 30, 2015.

Cisco has released bug ID CSCuv11947 for registered users, which
contains additional details and an up-to-date list of affected product
versions.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_of_privileges_via_dmg_install_script.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ