First published: Thu Jan 16 2014(Updated: )
Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber for Windows | <=9.2\(.1\) | |
Cisco Jabber for Windows | =9.0 | |
Cisco Jabber for Windows | =9.0\(.0\) | |
Cisco Jabber for Windows | =9.0\(.1\) | |
Cisco Jabber for Windows | =9.0\(.2\) | |
Cisco Jabber for Windows | =9.0\(.3\) | |
Cisco Jabber for Windows | =9.0\(.4\) | |
Cisco Jabber for Windows | =9.0\(.5\) | |
Cisco Jabber for Windows | =9.1 | |
Cisco Jabber for Windows | =9.1\(.0\) | |
Cisco Jabber for Windows | =9.1\(.1\) | |
Cisco Jabber for Windows | =9.1\(.2\) | |
Cisco Jabber for Windows | =9.1\(.3\) | |
Cisco Jabber for Windows | =9.1\(.4\) | |
Cisco Jabber for Windows | =9.1\(.5\) | |
Cisco Jabber for Windows | =9.2 | |
Cisco Jabber for Windows | =9.2\(.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0666 is rated as a high severity vulnerability due to the ability for remote attackers to upload arbitrary files.
To fix CVE-2014-0666, you should upgrade Cisco Jabber to the latest version that is not affected by this vulnerability.
CVE-2014-0666 affects Cisco Jabber versions 9.2(.1) and earlier, including all 9.1, 9.0, and earlier variants.
Exploiting CVE-2014-0666 can allow remote attackers to execute arbitrary code on the affected systems.
You can verify the vulnerability of your Cisco Jabber installation by checking the version number against the affected versions listed for CVE-2014-0666.