[<prev] [next>] [day] [month] [year] [list]
Message-id: <20120620122509.cisco-sa-20120620-ac@psirt.cisco.com>
Date: Wed, 20 Jun 2012 12:25:18 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: full-disclosure@...ts.grok.org.uk
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Multiple Vulnerabilities
in Cisco AnyConnect Secure Mobility Client
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
Advisory ID: cisco-sa-20120620-ac
Revision 1.0
For Public Release 2012 June 20 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
The Cisco AnyConnect Secure Mobility Client is affected by the
following vulnerabilities:
Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code
Execution Vulnerability
Cisco AnyConnect Secure Mobility Client VPN Downloader Software
Downgrade Vulnerability
Cisco AnyConnect Secure Mobility Client and Cisco Secure Desktop
HostScan Downloader Software Downgrade Vulnerability
Cisco AnyConnect Secure Mobility Client 64-bit Java VPN Downloader
Arbitrary Code Execution Vulnerability
Cisco has released free software updates that address these
vulnerabilities. Workarounds that mitigate these vulnerabilities are
available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAk/hxbIACgkQQXnnBKKRMNBg/gD/UfO5FCOVvzRdsSugHPrSrEFT
Rd4Q0AvReBoziS3fIfAA/isBKtBmeC+mseVPOPqAw8XlCaPCqBF58UOvRIx7mmaV
=4OQe
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists