Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0583.2 Multiple Vulnerabilities in Cisco TelePresence Video Communication Server, Cisco Expressway and Cisco TelePresence Conductor 12 March 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco TelePresence Video Communication Server (VCS) Cisco Expressway Cisco TelePresence Conductor Publisher: Cisco Systems Operating System: Cisco Impact/Access: Administrator Compromise -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-0653 CVE-2015-0652 Original Bulletin: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs Revision History: March 12 2015: Added CVEs for vulnerabilities March 12 2015: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Video Communication Server, Cisco Expressway and Cisco TelePresence Conductor Advisory ID: cisco-sa-20150311-vcs Revision 1.0 For Public Release 2015 March 11 16:00 UTC (GMT) +--------------------------------------------------------------------- Summary ======= Cisco TelePresence Video Communication Server (VCS), Cisco Expressway and Cisco TelePresence Conductor contain the following vulnerabilities: * SDP Media Description Denial of Service Vulnerability * Authentication Bypass Vulnerability Successful exploitation of the SDP Media Description Denial of Service Vulnerability may cause the affected system to reload. Successful exploitation of the Authentication Bypass Vulnerability may allow an attacker to bypass authentication and log in to the system with the privileges of an administrator. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs - -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJVAF7aAAoJEIpI1I6i1Mx3S10QAJhIupf/Gj2IJHMjYSd6JXH5 LvkDmwfuphrOHSVw2+OnWlFVK37qHg6JYQl12Wv7DQ8novToZrSJtn++KkjrwrE1 Tq9E5pAU36SBQhVlVGIPqGqQWVny3QxkddEaXPZoVdhTukyYV+enlM11FmfbER9k eFiBFcsBtDE9pF3owTqoavw5KoyQYq3uVpMnHuP1k4ite5tBmrrMa8xYxv/t0TMb CYzXbiIZ1C1coJbQuJP48Oj7ogmV9nqFXB+kdN+9GLlN5pLMzng2Ww5zdTOtfh3X wY5U5lQL3BOF5eJUU8XBBnho0JnaIkphLbZqkCCEgD5xYbtF2PWPpUDn7MYk0PyA FiMVbjyQKuTynTPtPYf0cKE/YlbaJbgYiJDqqyyf2cwD8LGPpUZ//NbYtCceROR9 fCAsBLeFKqZHHGc5d0ZdZhEytMeG4T262S3qAPba0RLRMGeKFq+lNLLI5pqZe1ON 7QSHBBmazwun1jsBA8bi+ZmYfOlt5hm3WSVs03JC231miZZCYUUpYLULgwwxkEq2 3MsHftzaWez70y/JY1JAFT6cQGgBn/XKwVtzFDZA/TXpPBnyoP05U1aK/HACYW30 XDa+oPiCgLsqB4zBlE8LCGxaULkrwEdyeEtXz3EnJDiPZPXPANElQ4syyxjBoYvX b/06KvYeUJ2Ho8WK140j =XBC5 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVQDS/xLndAQH1ShLAQJFLBAAtj4aOiHe6LgoU2RqdELs8xsQYnrrO650 6aGhj03gF6KVyWOfegwruXxpvojoklWrLU7T8v1AM8p+WUp2ph3ZhE18FjGF8acL 8BDg4uJOPgoI+/5DolBKprk+zxKexQ2Wc+lxLFdA1u0vso6YerXDXFF2EkEQgMdX Imz8ITSvL+X4nidONU6BH975cuXmFLyDFpAxXLNjgfgzwcIKW7pMHXshZMbPNqNu uZMJPCsMdlK8OeLRjC28XhZRGBTgw7r1ywB+qEhzIld3+Pd712S3mOeGUjom1Hcg iKqHyv0oGnsFpJAltupfAGrf53z70rUMZE+8YE1YeMc5TcHc9ztT8hKDXXOR47IK x+E27SNtIC9bawLvjUGW+UeQ3oiHbQZ8IdSrXC3CyZR7DLr2DHuUrmMVlAVgrpqQ iJf2uQhXG6XlJgYf0yGBxWoAMMRWxm0ZEldFkTqw/cXLj2euXoRLEMsjO/yaTL6R /CiFmYpvUNxSlEbR7PdlYDENg3/SM8L2wk8ozdBSRrNnHFOAoHUVQvXurbQhzNEU lJk1aR7jlAyxl57hDFc2Jk+g78YLKRj8p6Nf0hyWpYA4yPqZC2TLIOH2gyxFsjhR M5JlSv86I5EaqOKAiA3j3notGO7U9fDAo1ICl75s3z9aQ1utv51/XttBjKs8MKTk ba9prqCcvqk= =GlIE -----END PGP SIGNATURE-----