[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] Cisco Security Advisory: Authenticated Command Injection Vulnerability in Multiple
From: Cisco Systems Product Security Incident Response Team <psirt () cisco ! com>
Date: 2013-07-31 16:01:18
Message-ID: 201307311201.10.cm () psirt ! cisco ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Authenticated Command Injection Vulnerability in Multiple Cisco \
Content Network and Video Delivery Products
Advisory ID: cisco-sa-20130731-cm
Revision 1.0
For Public Release 2013 July 31 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Multiple Cisco content network and video delivery products contain a vulnerability when they \
are configured to run in central management mode. This vulnerability could allow an \
authenticated but unprivileged, remote attacker to execute arbitrary code on the affected \
system and on the devices managed by the affected system.
Cisco has released free software updates that address this vulnerability. Workarounds that \
mitigate this vulnerability are not available. This advisory is available at the following \
link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-cm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
iF4EAREKAAYFAlH5AAkACgkQUddfH3/BbTrB5wD+LzwjR/5XykM8jgZ2pvcTh+i0
w+cEK4klr2i+zpzoOckA/ilbSi5WS/lYJEdEavvjOkxNVlPsqeQ168DlbpyLbMOI
=ZTje
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic