First published: Wed Mar 18 2015(Updated: )
The IPC channel in Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to write to arbitrary userspace memory locations, and consequently gain privileges, via crafted messages, aka Bug ID CSCus79195.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AnyConnect Secure | <=4.0\(.00051\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0664 is considered to have high severity due to its potential for local privilege escalation.
To fix CVE-2015-0664, upgrade to Cisco AnyConnect Secure Mobility Client version 4.0 or later than 4.0(.00051).
CVE-2015-0664 affects systems running Cisco AnyConnect Secure Mobility Client versions up to and including 4.0(.00051).
CVE-2015-0664 can facilitate local privilege escalation attacks by allowing users to write to arbitrary userspace memory locations.
There are no official workarounds for CVE-2015-0664; the only mitigation is to apply the vendor-supplied patch or upgrade.