lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1DBC7FD9-24A9-4540-A369-78518BC0FD83@ddifrontline.com> Date: Wed, 26 Oct 2011 15:46:22 -0500 From: ddivulnalert <ddivulnalert@...frontline.com> To: <full-disclosure@...ts.grok.org.uk> Subject: DDIVRT-2011-35 Cisco Unified Contact Center Express Directory Traversal [CVE-2011-3315] Title ----- DDIVRT-2011-35 Cisco Unified Contact Center Express Directory Traversal [CVE-2011-3315] Severity -------- High Date Discovered --------------- August 9, 2011 Discovered By ------------- Digital Defense, Inc. Vulnerability Research Team Credit: r@...$ Vulnerability Description ------------------------- The default deployment of Cisco Unified Contact Center Express (UCCX) system is configured with multiple listening services. The web service that is listening on TCP port 9080, or on TCP port 8080 in versions prior to 8.0(x), serves a directory which is configured in a way that allows for a remote unauthenticated attacker to retrieve arbitrary files from the UCCX root filesystem through a directory traversal attack. It is possible for an attacker to use this vector to gain console access to the vulnerable node as the 'ccxcluster' user, and subsequently escalate privileges. Solution Description -------------------- Cisco has released a patch for this vulnerability. Information regarding the software update which addresses this issue is available at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx Tested Systems / Software ------------------------- Cisco Unified Contact Center Express (UCCX) versions: 8.5(x), 8.0(x), 7.0(x), 6.0(x) Cisco Unified IP Interactive Voice Response (Unified IP-IVR) versions: 8.5(x), 8.0(x), 7.0(x), 6.0(x) Vendor Contact -------------- Vendor Name: Cisco Vendor Website: http://www.cisco.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists