Vulnerabilities > CVE-2012-1335 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco Webex Recording Format Player
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 L through SP11 EP26, T27 LB through SP21 EP10, T27 LC before SP25 EP10, and T27 LD before SP32 CP1 allows remote attackers to execute arbitrary code via a crafted WRF file, a different vulnerability than CVE-2012-1336 and CVE-2012-1337.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family | Windows |
NASL id | CISCO-SA-20120404-WEBEX.NASL |
description | The version of Cisco WebEx WRF Player installed on the remote host has multiple buffer overflow vulnerabilities. An attacker could exploit these issues by tricking a user into opening a malicious WRF file, resulting in arbitrary code execution. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 58621 |
published | 2012-04-06 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/58621 |
title | Cisco WebEx WRF Player Multiple Buffer Overflows (cisco-sa-20120404-webex) |
code |
|
Seebug
bulletinFamily | exploit |
description | Bugtraq ID: 52882 CVE ID:CVE-2012-1335 Cisco WebEx是Cisco公司提供的网络会议解决方案,Cisco WebEx Player用于播放与会者在电脑上所记录的WebEx会议记录 Cisco WebEx Player存在多个缓冲区溢出问题,允许攻击者以应用程序上下文执行任意代码 攻击者可以构建恶意WRF文件,诱使用户解析来触发此漏洞 0 Cisco WebEx (Windows) T27 LD SP32 Cisco WebEx (Windows) T27 LC SP25 EP9 Cisco WebEx (Windows) T27 LB SP21 EP10 Cisco WebEx (Windows) T27 L SP11 EP26 Cisco WebEx (Mac OS X) T27 LD SP32 Cisco WebEx (Mac OS X) T27 LC SP25 EP9 Cisco WebEx (Mac OS X) T27 LB SP21 EP10 Cisco WebEx (Mac OS X) T27 L SP11 EP26 Cisco WebEx (Linux) T27 LD SP32 Cisco WebEx (Linux) T27 LC SP25 EP9 Cisco WebEx (Linux) T27 LB SP21 EP10 Cisco WebEx (Linux) T27 L SP11 EP26 厂商解决方案 用户可参考如下供应商提供的安全公告获得补丁信息: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex#software |
id | SSV:60023 |
last seen | 2017-11-19 |
modified | 2012-04-07 |
published | 2012-04-07 |
reporter | Root |
title | Cisco WebEx WRF文件格式缓冲区溢出漏洞 |