Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0006 A vulnerability has been identified in Cisco WebEx Chrome Plugin 24 January 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco WebEx Chrome Plugin Operating System: OS X Windows Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Mitigation Member content until: Thursday, February 23 2017 OVERVIEW A remote code execution vulnerability has been identified in Cisco's WebEx Chrome Plugin prior to version 1.0.3.[1] There has also been reports of version 1.0.3 still being partially vulnerable. [2] IMPACT The Google 0-Day project has provided the following information: "The Google 0-Day project announced a critical remote code execution vulnerability in Cisco's WebEx plugin for Google Chrome. This vulnerability allows a remote attacker to execute arbitrary code on the victim's system by delivering it to the WebEx plugin via a special "secret" URL." [2] MITIGATION AusCERT would recommend uninstalling this plugin from Chrome until either version 1.0.3 is confirmed as a valid fix to this vulnerability or until a newer version with a valid vulnerability fix is released. [1] [2] REFERENCES [1] Cisco: Magic WebEx URL Allows Arbitrary Remote Command Execution https://bugs.chromium.org/p/project-zero/issues/detail?id=1096 [2] Critical Vulnerability in Cisco WebEx Chrome Plugin https://isc.sans.edu/diary/Critical+Vulnerability+in+Cisco+WebEx+Chrome+Plugin/21965 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWIa/V4x+lLeg9Ub1AQh3yg/+MOQOY2hkKkE7PauGnPFIP1qmGI9BTxvm MEScgBedq87suced6W/PRf04JEcDl3CywCliDFfxwXgo70+2EgWa2vRoNQbKbv4o YB0Ak9XQuQIeNkmvEdtn9SyJgyWRZXSI0Tua5ISJoy0bifL2trPaq8nYf/I/v6Fg jOsULwpaWj5tzDc+ZJRFupG1b3PXS7U7pw/siLBbpSxRYeJrze+T+zxX8TbsDi2i FMWsfeStb6eDbx6GzKK4DVo3/LUDkZaOtUMOPmx/74iQ4gHlc/TuH2iWFYs5w/Lb iESnIzNwFQY6lS7dK2NzsO4QicX81RNb2QSDguaCy+p116FsfaJYmxWka7dTM5Id 0RWBDwKZSNMDnrLJ/27ZIbKlxrmlgPgf8T4eEbfSGl6PoChSAaDb041URCG190XV TGwHOcyxZFKQEc7sR65J9R+PHth2s7zn9O4ogfSr18ymLWvL5Z8a7u1qjJEA6304 6KfKdz1E8F2gYGbMu4acUcLgPX0v9NFmrOhmWgoW+t6Vmjo4eEHvA8TyjebxmRzS tS6RLAL+/ozZ/v79KZNYhiCURqCeAzhjUKKMoZHh0gS9C7RUQteplysysENGNV2L InJvBy6xT2LcQTd1gQciyLfbgd2Dy+u0Lzdojc6Vf65D4as6FhnLmx6V7m+biSOJ +q/duQlw9gc= =+oCx -----END PGP SIGNATURE-----