First published: Wed Feb 22 2017(Updated: )
An HTTP Packet Processing vulnerability in the Web Bridge interface of the Cisco Meeting Server (CMS), formerly Acano Conferencing Server, could allow an authenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. In addition, the attacker could potentially cause the application to crash unexpectedly, resulting in a denial of service (DoS) condition. The attacker would need to be authenticated and have a valid session with the Web Bridge. Affected Products: This vulnerability affects Cisco Meeting Server software releases prior to 2.1.2. This product was previously known as Acano Conferencing Server. More Information: CSCvc89551. Known Affected Releases: 2.0 2.0.7 2.1. Known Fixed Releases: 2.1.2.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server | =2.0.0 | |
Cisco Meeting Server | =2.0.1 | |
Cisco Meeting Server | =2.0.3 | |
Cisco Meeting Server | =2.0.4 | |
Cisco Meeting Server | =2.0.5 | |
Cisco Meeting Server | =2.0.6 | |
Cisco Meeting Server | =2.0.7 | |
Cisco Meeting Server | =2.0.8 | |
Cisco Meeting Server | =2.0.9 | |
Cisco Meeting Server | =2.1.0 | |
Cisco Meeting Server | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.