[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Cisco Security Advisory: Cisco WAAS Central Manager Remote Code Execution Vulnerability
From:       Cisco Systems Product Security Incident Response Team <psirt () cisco ! com>
Date:       2013-07-31 16:01:02
Message-ID: 201307311201.6.waascm () psirt ! cisco ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco WAAS Central Manager Remote Code Execution \
Vulnerability

Advisory ID: cisco-sa-20130731-waascm

Revision 1.0

For Public Release 2013 July 31 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), \
contains a vulnerability that could allow an unauthenticated, remote attacker to \
execute arbitrary code on the affected system.

Cisco has released free software updates that address this vulnerability. Workarounds \
that mitigate this vulnerability are not available. This advisory is available at the \
following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm
                
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)

iF4EAREKAAYFAlH5ABAACgkQUddfH3/BbTrXBwD/dCyJFiBaFl8ueRogQEkPPut6
yiRBwMzfQ/ZRx2asgrUA/3uLKSo8KYn0M5uRhLzq18GMg1mU8SQfHnXUgN3Yf6XQ
=v7OF
-----END PGP SIGNATURE-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic