[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Cisco Security Advisory: Cisco WAAS Central Manager Remote Code Execution Vulnerability
From: Cisco Systems Product Security Incident Response Team <psirt () cisco ! com>
Date: 2013-07-31 16:01:02
Message-ID: 201307311201.6.waascm () psirt ! cisco ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Cisco WAAS Central Manager Remote Code Execution \
Vulnerability
Advisory ID: cisco-sa-20130731-waascm
Revision 1.0
For Public Release 2013 July 31 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), \
contains a vulnerability that could allow an unauthenticated, remote attacker to \
execute arbitrary code on the affected system.
Cisco has released free software updates that address this vulnerability. Workarounds \
that mitigate this vulnerability are not available. This advisory is available at the \
following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
iF4EAREKAAYFAlH5ABAACgkQUddfH3/BbTrXBwD/dCyJFiBaFl8ueRogQEkPPut6
yiRBwMzfQ/ZRx2asgrUA/3uLKSo8KYn0M5uRhLzq18GMg1mU8SQfHnXUgN3Yf6XQ
=v7OF
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic