SB2017012501 - Remote code execution in Cisco WebEx Browser Extension



SB2017012501 - Remote code execution in Cisco WebEx Browser Extension

Published: January 25, 2017 Updated: January 25, 2017

Security Bulletin ID SB2017012501
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Memory corruption (CVE-ID: CVE-2017-3823)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing specially crafted patterns, related to WebEx session in Cisco WebEx Browser Extension for Chrome. Firefox and Internet Explorer. A remote attacker can trick the victim into visiting a specially crafted website and starting WebEx session, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.

The affected extension is shipped with two Cisco products: Cisco WebEx Meetings Server and Cisco WebEx Meetings Center.


Remediation

Install update from vendor's website.