First published: Thu Feb 22 2007(Updated: )
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting "a thread under ConnectionClient.exe," aka CSCsg20558.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Trust Agent | =2.0 | |
Cisco Security Agent | =5.1 | |
Cisco Security Agent | =5.0 | |
Cisco Secure Services Client | =4.0.51 | |
Cisco Secure Services Client | =4.0 | |
Cisco Trust Agent | =2.0.1 | |
Meetinghouse AEGIS SecureConnect Client | =windows_platform | |
Cisco Trust Agent | =2.1 | |
Cisco Trust Agent | =1.0 | |
Cisco Secure Services Client | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.