The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 on Windows, and 2.x before 2.5 MR6 and 3.x before 3.0 MR8 on Mac OS X and Linux, does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug ID CSCtw47523.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2012-06-20 20:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-2493
Mitre link : CVE-2012-2493
CVE.ORG link : CVE-2012-2493
JSON object : View
Products Affected
apple
- mac_os_x
microsoft
- windows
cisco
- anyconnect_secure_mobility_client
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation