Check Point Reference: | CPAI-2012-313 |
Date Published: | 23 Jul 2012 |
Severity: | Medium |
Last Updated: | Thursday 21 November, 2024 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Cisco Systems WebEx Player T27LC Prior To 3.23.2511 Cisco Systems WebEx Player T27LD Prior To 3.29.3202 |
Vulnerability Description | A remote code execution vulnerability has been reported in Cisco WebEx Recording Format (WRF) Player. |
Vulnerability Details | The vulnerability is due to a buffer overflow condition when handling specially crafted WRF files. A remote attacker can exploit this issue by enticing a target user to open a specially crafted .WRF file. Successful exploitation would allow an attacker to execute arbitrary code on the target host, in the security context of the logged on user. |
This protection will detect and block the transferring of a malicious WRF file to the target host.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Cisco Protection Violation
Attack Information: Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow