-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0006
     A vulnerability has been identified in Cisco WebEx Chrome Plugin
                              24 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Cisco WebEx Chrome Plugin
Operating System:     OS X
                      Windows
                      Linux variants
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:           Mitigation
Member content until: Thursday, February 23 2017

OVERVIEW

        A remote code execution vulnerability has been identified in Cisco's
        WebEx Chrome Plugin prior to version 1.0.3.[1] There has also been 
        reports of version 1.0.3 still being partially vulnerable. [2]


IMPACT

        The Google 0-Day project has provided the following information:
        
        "The Google 0-Day project announced a critical remote code execution
        vulnerability in Cisco's WebEx plugin for Google Chrome. This 
        vulnerability allows a remote attacker to execute arbitrary code on
        the victim's system by delivering it to the WebEx plugin via a 
        special "secret" URL." [2]


MITIGATION

        AusCERT would recommend uninstalling this plugin from Chrome until 
        either version 1.0.3 is confirmed as a valid fix to this 
        vulnerability or until a newer version with a valid vulnerability 
        fix is released. [1] [2]


REFERENCES

        [1] Cisco: Magic WebEx URL Allows Arbitrary Remote Command Execution
            https://bugs.chromium.org/p/project-zero/issues/detail?id=1096

        [2] Critical Vulnerability in Cisco WebEx Chrome Plugin
            https://isc.sans.edu/diary/Critical+Vulnerability+in+Cisco+WebEx+Chrome+Plugin/21965

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+oCx
-----END PGP SIGNATURE-----