First published: Wed Feb 02 2011(Updated: )
Stack-based buffer overflow in Cisco WebEx Meeting Center T27LB before SP21 EP3 and T27LC before SP22 allows user-assisted remote authenticated users to execute arbitrary code by providing a crafted .atp file and then disconnecting from a meeting. NOTE: since this is a site-specific issue with no expected action for consumers, it might be REJECTed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Meeting Center | =27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3270 is rated as a high severity vulnerability due to its potential for arbitrary code execution.
The fix for CVE-2010-3270 involves upgrading Cisco WebEx Meeting Center to version SP21 EP3 or later for T27LB and to version SP22 or later for T27LC.
Users of Cisco WebEx Meeting Center T27LB before SP21 EP3 and T27LC before SP22 are affected by CVE-2010-3270.
CVE-2010-3270 can be exploited by a remote authenticated user providing a crafted .atp file and then disconnecting from a meeting.
Yes, CVE-2010-3270 is considered a site-specific issue as it requires user assistance for exploitation.