The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 on Windows, and 2.x before 2.5 MR6 and 3.x before 3.0 MR8 on Mac OS X and Linux, does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug ID CSCtw47523.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac - Vendor Advisory |
Information
Published : 2012-06-20 20:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2493
Mitre link : CVE-2012-2493
CVE.ORG link : CVE-2012-2493
JSON object : View
Products Affected
apple
- mac_os_x
linux
- linux_kernel
microsoft
- windows
cisco
- anyconnect_secure_mobility_client
CWE
CWE-20
Improper Input Validation