Cisco WebEx Recording Format Player における情報漏えいに関する脆弱性
| Title |
Cisco WebEx Recording Format Player における情報漏えいに関する脆弱性
|
| Summary |
Cisco WebEx Recording Format (WRF) Player には、情報漏えいに関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvh89107、CSCvh89113、CSCvh89132、および CSCvh89142 として公開しています。
|
| Possible impacts |
情報を取得される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 2, 2018, midnight |
| Registration Date |
June 29, 2018, 6:11 p.m. |
| Last Update |
June 29, 2018, 6:11 p.m. |
|
CVSS3.0 : 警告
|
| Score |
5.3
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
CVSS2.0 : 警告
|
| Score |
5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
Affected System
| シスコシステムズ |
|
Cisco WebEx Meetings
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月29日] 掲載 |
June 29, 2018, 6:11 p.m. |
NVD Vulnerability Information
CVE-2018-0288
| Summary |
A vulnerability in Cisco WebEx Recording Format (WRF) Player could allow an unauthenticated, remote attacker to access sensitive data about the application. An attacker could exploit this vulnerability to gain information to conduct additional reconnaissance attacks. The vulnerability is due to a design flaw in Cisco WRF Player. An attacker could exploit this vulnerability by utilizing a maliciously crafted file that could bypass checks in the code and enable an attacker to read memory from outside the bounds of the mapped file. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, and Cisco WebEx WRF players. Cisco Bug IDs: CSCvh89107, CSCvh89113, CSCvh89132, CSCvh89142.
|
| Publication Date |
May 3, 2018, 7:29 a.m. |
| Registration Date |
March 1, 2021, 6:36 p.m. |
| Last Update |
Nov. 21, 2024, 12:37 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:cisco:webex_meetings_online:t31.20.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:webex_meetings_online:t31.20:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List