First published: Fri Jun 29 2012(Updated: )
Stack-based buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 L through SP11 EP26, T27 LB through SP21 EP10, T27 LC before SP25 EP11, T27 LD before SP32 CP2, and T28 L10N before SP1 allows remote attackers to execute arbitrary code via a crafted DHT chunk in a JPEG image within a WRF file, aka Bug ID CSCtz72953.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Advanced Recording Format Player | >=27.11.0<=27.11.26 | |
Cisco WebEx Advanced Recording Format Player | >=27.21.0<=27.21.10 | |
Cisco WebEx Advanced Recording Format Player | >=27.25.0<27.25.11 | |
Cisco WebEx Advanced Recording Format Player | >=27.32.0<27.32.2 | |
Cisco WebEx Advanced Recording Format Player | >=28.0.0<28.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3055 has a high severity rating due to the potential for remote code execution.
To fix CVE-2012-3055, update the Cisco WebEx Recording Format Player to a version that is not affected by this vulnerability.
CVE-2012-3055 affects various versions of Cisco WebEx Recording Format Player including T27 L through SP11 EP26 and others listed in the advisory.
Yes, CVE-2012-3055 can be exploited remotely through a specially crafted JPEG image.
Exploiting CVE-2012-3055 could allow an attacker to execute arbitrary code on the target system.