First published: Wed Jul 03 2019(Updated: )
A vulnerability in the loading mechanism of specific dynamic link libraries in Cisco Jabber for Windows could allow an authenticated, local attacker to perform a DLL preloading attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of the resources loaded by the application at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. The malicious DLL file would execute when the Jabber application launches. A successful exploit could allow the attacker to execute arbitrary code on the target machine with the privileges of another user's account. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-jabber-dll
Credit: security researcher "wjcsharp". Hou JingYi Qihoo 360 CERT for also reporting this vulnerability
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190703-jabber-dll is classified as high due to the potential impact of a DLL preloading attack.
To fix cisco-sa-20190703-jabber-dll, ensure that you are running the latest version of Cisco Jabber for Windows, as updates include patches for this vulnerability.
Any authenticated, local users of Cisco Jabber for Windows who have access to the software are potentially affected by cisco-sa-20190703-jabber-dll.
cisco-sa-20190703-jabber-dll involves a DLL preloading attack, which can allow an attacker to execute malicious code.
No, cisco-sa-20190703-jabber-dll requires local access and valid credentials to exploit the vulnerability.