[<prev] [next>] [day] [month] [year] [list]
Message-id: <201307311201.10.cm@psirt.cisco.com>
Date: Wed, 31 Jul 2013 12:01:18 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: full-disclosure@...ts.grok.org.uk
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Authenticated Command
Injection Vulnerability in Multiple Cisco Content Network and
Video Delivery Products
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Authenticated Command Injection Vulnerability in Multiple Cisco Content Network and Video Delivery Products
Advisory ID: cisco-sa-20130731-cm
Revision 1.0
For Public Release 2013 July 31 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Multiple Cisco content network and video delivery products contain a vulnerability when they are configured to run in central management mode. This vulnerability could allow an authenticated but unprivileged, remote attacker to execute arbitrary code on the affected system and on the devices managed by the affected system.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-cm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
iF4EAREKAAYFAlH5AAkACgkQUddfH3/BbTrB5wD+LzwjR/5XykM8jgZ2pvcTh+i0
w+cEK4klr2i+zpzoOckA/ilbSi5WS/lYJEdEavvjOkxNVlPsqeQ168DlbpyLbMOI
=ZTje
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists