-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1432
         Cisco AnyConnect Local Privilege Escalation Vulnerability
                                8 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco AnyConnect
Publisher:         Cisco Systems
Operating System:  Windows
Impact/Access:     Administrator Compromise -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-6638  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco AnyConnect Local Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20170607-anyconnect

Revision: 1.0

For Public Release: 2017 June 7 16:00 GMT

Last Updated: 2017 June 7 16:00 GMT

CVE ID(s): CVE-2017-6638

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account.

The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect"]

- -----BEGIN PGP SIGNATURE-----
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=HRqJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=uarP
-----END PGP SIGNATURE-----