
11 new exploits IBM AIX 5.2/5.3 FTP Client - Local Buffer Overflow Yahoo! Widgets Engine 4.0.3 - YDPCTL.dll ActiveX Control Buffer Overflow Simple PHP Blog 0.8.4 - Cross-Site Request Forgery (Add Admin) Simple PHP Blog 0.8.4 - (Add Admin) Cross-Site Request Forgery miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post) miniblog 1.0.1 - (Add New Post) Cross-Site Request Forgery PHP Press Release - Cross-Site Request Forgery (Add Admin) PHP Press Release - (Add Admin) Cross-Site Request Forgery Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post) Spacemarc News - Cross-Site Request Forgery (Add New Post) Minecraft Launcher - Insecure File Permissions Privilege Escalation Maian Weblog 4.0 - (Add New Post) Cross-Site Request Forgery Spacemarc News - (Add New Post) Cross-Site Request Forgery Minecraft Launcher 1.6.61 - Insecure File Permissions Privilege Escalation sheed AntiVirus - Unquoted Service Path Privilege Escalation AVTECH IP Camera_ NVR_ and DVR Devices - Multiple Vulnerabilities sheed AntiVirus 2.3 - Unquoted Service Path Privilege Escalation AVTECH IP Camera_ NVR_ and DVR Devices - Multiple Vulnerabilities Linux Kernel 3.13.1 - Recvmmsg Privilege Escalation (Metasploit) Linux Kernel 3.13.1 - 'Recvmmsg' Privilege Escalation (Metasploit) ApPHP MicroBlog 1.0.2 - Cross-Site Request Forgery (Add New Author) ApPHP MicroBlog 1.0.2 - (Add New Author) Cross-Site Request Forgery Subversion 1.6.6 / 1.6.12 - Code Execution Cisco Webex Player T29.10 - '.WRF' Use-After-Free Memory Corruption Cisco Webex Player T29.10 - '.ARF' Out-of-Bounds Memory Corruption Adobe Flash Player 23.0.0.162 - '.SWF' ConstantPool Critical Memory Corruption Categorizator 0.3.1 - SQL Injection NetBilletterie 2.8 - Multiple Vulnerabilities ApPHP MicroCMS 3.9.5 - Stored Cross Site Scripting OpenCimetiere v3.0.0-a5 - Blind SQL Injection Android - Binder Generic ASLR Leak ApPHP MicroCMS 3.9.5 - (Add Admin) Cross-Site Request Forgery
60 lines
No EOL
2.4 KiB
Text
Executable file
60 lines
No EOL
2.4 KiB
Text
Executable file
#####################################################################################
|
|
|
|
# Application: Cisco Webex Player
|
|
# Platforms: Windows
|
|
# Versions: Cisco Webex Meeting Player version T29.10
|
|
# Author: Francis Provencher of COSIG
|
|
# Website: https://cosig.gouv.qc.ca/en/advisory/
|
|
# Twitter: @COSIG_
|
|
# Date: August 31, 2016
|
|
# CVE: CVE-2016-1464
|
|
# COSIG-2016-33
|
|
|
|
#####################################################################################
|
|
|
|
1) Introduction
|
|
2) Report Timeline
|
|
3) Technical details
|
|
4) POC
|
|
|
|
#######################################################################################
|
|
|
|
===================
|
|
1) Introduction
|
|
===================
|
|
|
|
Cisco WebEx, formerly WebEx Communications Inc. is a company that provides on-demand collaboration, online meeting, web conferencing and videoconferencing applications. Its products include Meeting Center, Training Center, Event Center, Support Center, Sales Center, MeetMeNow, PCNow, WebEx AIM Pro Business Edition, WebEx WebOffice, and WebEx Connect. All WebEx products are part of the Cisco collaboration portfolio. All Cisco WebEx products are offered by Cisco Systems Inc.
|
|
|
|
(https://en.wikipedia.org/wiki/WebEx)
|
|
|
|
#######################################################################################
|
|
|
|
===================
|
|
2) Report Timeline
|
|
===================
|
|
|
|
2016-05-25: Francis Provencher of COSIG report the vulnerability to Cisco PSIRT
|
|
2016-06-07: Cisco PSIRT confirm the vulnerability
|
|
2016-08-09: Cisco fixed the issue
|
|
2016-08-09: Advisory released
|
|
|
|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-player
|
|
|
|
#######################################################################################
|
|
|
|
===================
|
|
3) Technical details
|
|
===================
|
|
|
|
The specific flaw exists within the parsing process of an invalid JPG in WRF file. An attacker can use this flaw to create a use-after-free memory corruption, which could allow for the execution of arbitrary code in the context of the current process
|
|
|
|
#######################################################################################
|
|
|
|
==========
|
|
4) POC
|
|
==========
|
|
|
|
https://cosig.gouv.qc.ca/wp-content/uploads/2016/09/COSIG-2016-33.zip
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40508.zip
|
|
|
|
####################################################################################### |