First published: Thu Jan 16 2014(Updated: )
Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber | <=9.2\(.1\) | |
Cisco Jabber | =9.0 | |
Cisco Jabber | =9.0\(.0\) | |
Cisco Jabber | =9.0\(.1\) | |
Cisco Jabber | =9.0\(.2\) | |
Cisco Jabber | =9.0\(.3\) | |
Cisco Jabber | =9.0\(.4\) | |
Cisco Jabber | =9.0\(.5\) | |
Cisco Jabber | =9.1 | |
Cisco Jabber | =9.1\(.0\) | |
Cisco Jabber | =9.1\(.1\) | |
Cisco Jabber | =9.1\(.2\) | |
Cisco Jabber | =9.1\(.3\) | |
Cisco Jabber | =9.1\(.4\) | |
Cisco Jabber | =9.1\(.5\) | |
Cisco Jabber | =9.2 | |
Cisco Jabber | =9.2\(.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.