var-201706-0585
Vulnerability from variot
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious ARF file via email or URL and convincing the user to launch the file. Exploitation of these vulnerabilities could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. The Cisco WebEx Network Recording Player is an application that is used to play back WebEx meeting recordings that have been recorded on the computer of an online meeting attendee. The player can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The following client builds are affected by this vulnerability: Cisco WebEx Business Suite (WBS29) client builds prior to T29.13.130, Cisco WebEx Business Suite (WBS30) client builds prior to T30.17, Cisco WebEx Business Suite (WBS31) client builds prior to T31.10. Cisco Bug IDs: CSCvc47758 CSCvc51227 CSCvc51242. Vendors have confirmed this vulnerability Bug ID CSCvc47758 , CSCvc51227 ,and CSCvc51242 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. A buffer overflow vulnerability exists in Cisco WebExNetworkRecordingPlayer. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Versions prior to 10
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "webex business suite client", "scope": "eq", "trust": 2.7, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "webex", "scope": null, "trust": 2.1, "vendor": "cisco", "version": null }, { "_id": null, "model": "webex advanced recording format player", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "29.10" }, { "_id": null, "model": "webex meetings player t29.10", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "_id": null, "model": "webex network recording player", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "webex advanced recording format player", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "_id": null, "model": "webex arf player", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "29.10_base" }, { "_id": null, "model": "webex business suite client t31.10", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "_id": null, "model": "webex business suite client t30.17", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "_id": null, "model": "webex business suite client t29.13.130", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "BID", "id": "99196" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "CNNVD", "id": "CNNVD-201706-951" }, { "db": "NVD", "id": "CVE-2017-6669" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:webex_advanced_recording_format_player", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005144" } ] }, "credits": { "_id": null, "data": "Steven Seeley of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" } ], "trust": 2.1 }, "cve": "CVE-2017-6669", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-6669", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 3.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2017-16244", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-114872", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-6669", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-6669", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2017-6669", "trust": 2.1, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2017-6669", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-6669", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-16244", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201706-951", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-114872", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "VULHUB", "id": "VHN-114872" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "CNNVD", "id": "CNNVD-201706-951" }, { "db": "NVD", "id": "CVE-2017-6669" } ] }, "description": { "_id": null, "data": "Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious ARF file via email or URL and convincing the user to launch the file. Exploitation of these vulnerabilities could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. The Cisco WebEx Network Recording Player is an application that is used to play back WebEx meeting recordings that have been recorded on the computer of an online meeting attendee. The player can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The following client builds are affected by this vulnerability: Cisco WebEx Business Suite (WBS29) client builds prior to T29.13.130, Cisco WebEx Business Suite (WBS30) client builds prior to T30.17, Cisco WebEx Business Suite (WBS31) client builds prior to T31.10. Cisco Bug IDs: CSCvc47758 CSCvc51227 CSCvc51242. Vendors have confirmed this vulnerability Bug ID CSCvc47758 , CSCvc51227 ,and CSCvc51242 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. A buffer overflow vulnerability exists in Cisco WebExNetworkRecordingPlayer. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Versions prior to 10", "sources": [ { "db": "NVD", "id": "CVE-2017-6669" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "BID", "id": "99196" }, { "db": "VULHUB", "id": "VHN-114872" } ], "trust": 4.41 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2017-6669", "trust": 5.5 }, { "db": "BID", "id": "99196", "trust": 2.6 }, { "db": "SECTRACK", "id": "1038737", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-005144", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-4277", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-17-442", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-4279", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-17-444", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-4278", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-17-443", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201706-951", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-16244", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-114872", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "VULHUB", "id": "VHN-114872" }, { "db": "BID", "id": "99196" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "CNNVD", "id": "CNNVD-201706-951" }, { "db": "NVD", "id": "CVE-2017-6669" } ] }, "id": "VAR-201706-0585", "iot": { "_id": null, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "VULHUB", "id": "VHN-114872" } ], "trust": 1.30416665 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-16244" } ] }, "last_update_date": "2024-11-23T23:05:25.609000Z", "patch": { "_id": null, "data": [ { "title": "cisco-sa-20170621-wnrp", "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-wnrp" }, { "title": "Patch for CiscoWebExCiscoWebExNetworkRecordingPlayer Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/98683" }, { "title": "Cisco WebEx Network Recording Player Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71173" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "CNNVD", "id": "CNNVD-201706-951" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114872" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "NVD", "id": "CVE-2017-6669" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170621-wnrp" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/99196" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038737" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6669" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6669" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-17-442" }, { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" }, { "db": "CNVD", "id": "CNVD-2017-16244" }, { "db": "VULHUB", "id": "VHN-114872" }, { "db": "BID", "id": "99196" }, { "db": "JVNDB", "id": "JVNDB-2017-005144" }, { "db": "CNNVD", "id": "CNNVD-201706-951" }, { "db": "NVD", "id": "CVE-2017-6669" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-17-442", "ident": null }, { "db": "ZDI", "id": "ZDI-17-444", "ident": null }, { "db": "ZDI", "id": "ZDI-17-443", "ident": null }, { "db": "CNVD", "id": "CNVD-2017-16244", "ident": null }, { "db": "VULHUB", "id": "VHN-114872", "ident": null }, { "db": "BID", "id": "99196", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2017-005144", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201706-951", "ident": null }, { "db": "NVD", "id": "CVE-2017-6669", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-442", "ident": null }, { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-444", "ident": null }, { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-443", "ident": null }, { "date": "2017-07-24T00:00:00", "db": "CNVD", "id": "CNVD-2017-16244", "ident": null }, { "date": "2017-06-26T00:00:00", "db": "VULHUB", "id": "VHN-114872", "ident": null }, { "date": "2017-06-21T00:00:00", "db": "BID", "id": "99196", "ident": null }, { "date": "2017-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005144", "ident": null }, { "date": "2017-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-951", "ident": null }, { "date": "2017-06-26T07:29:00.230000", "db": "NVD", "id": "CVE-2017-6669", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-442", "ident": null }, { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-444", "ident": null }, { "date": "2017-06-23T00:00:00", "db": "ZDI", "id": "ZDI-17-443", "ident": null }, { "date": "2017-07-24T00:00:00", "db": "CNVD", "id": "CNVD-2017-16244", "ident": null }, { "date": "2017-07-07T00:00:00", "db": "VULHUB", "id": "VHN-114872", "ident": null }, { "date": "2017-06-21T00:00:00", "db": "BID", "id": "99196", "ident": null }, { "date": "2017-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005144", "ident": null }, { "date": "2021-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-951", "ident": null }, { "date": "2024-11-21T03:30:16.123000", "db": "NVD", "id": "CVE-2017-6669", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-951" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Cisco WebEx Network Recording Player ARF File Memory Corruption Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-17-444" }, { "db": "ZDI", "id": "ZDI-17-443" } ], "trust": 1.4 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-951" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.