First published: Thu Nov 30 2017(Updated: )
A Buffer Overflow vulnerability in Cisco WebEx Network Recording Player for Advanced Recording Format (.arf) files could allow an attacker to execute arbitrary code on a system. An attacker could exploit this vulnerability by providing a user with a malicious .arf file via email or URL and convincing the user to launch the file. Exploitation of this vulnerability could allow arbitrary code execution on the system of the targeted user. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCve10729, CSCve10771, CSCve10779, CSCve11521, CSCve11543.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Meeting Center | =t29 | |
Cisco WebEx Meeting Center | =t30 | |
Cisco WebEx Meeting Center | =t31 | |
Cisco WebEx Meeting Center | =t32 | |
Cisco WebEx Meetings Server | =2.6.0 | |
Cisco WebEx Meetings Server | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12359 is medium with a CVSS score of 6.5.
CVE-2017-12359 affects Cisco WebEx Meeting Center versions t29, t30, t31, and t32.
CVE-2017-12359 affects Cisco WebEx Meetings Server versions 2.6.0 and 2.7.0.
An attacker can exploit CVE-2017-12359 by providing a user with a malicious .arf file via email or URL.
Yes, you can find references for CVE-2017-12359 at the following links: [SecurityFocus](http://www.securityfocus.com/bid/102186) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex).