SB2017090801 - Multiple Vulnerabilities in Cisco Emergency Responder



SB2017090801 - Multiple Vulnerabilities in Cisco Emergency Responder

Published: September 8, 2017 Updated: September 11, 2017

Security Bulletin ID SB2017090801
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Denial of service (CVE-ID: CVE-2017-9793)

The vulnerability allows a remote attacker to cause DoS condition.

The weakness exists due to an error when using outdated XStream library with the Struts REST plugin. A remote attacker can send a a specially crafted request with XML payload and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

2) Denial of service (CVE-ID: CVE-2017-9804)

The vulnerability allows a remote attacker to cause DoS condition.

The weakness exists due to server process overload when performing validation of the URL. A remote attacker can supply a specially crafted URL in a form field to trigger an error in regular expression (regex) processin, consume excessive CPU resources and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

3) Deserialization of untrusted data (CVE-ID: CVE-2017-9805)

The vulnerability allows a remote attacker to execute arbitrary code on the server.

The weakness exists due to absent filtration in XStream instance when deserializing XML data within the REST Plugin. A remote attacker can upload a specially crafted XML file to vulnerable Apache Struts installation, trigger the XStreamHandler to process malicious XML payload and execute arbitrary core on the target system.

Successful exploitation of the vulnerability is possible in case the attacker is able to upload XML.

Remediation

Install update from vendor's website.