The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 on Windows, and 2.x before 2.5 MR6 and 3.x before 3.0 MR8 on Mac OS X and Linux, does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug ID CSCtw47523.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2012-06-20 13:55
Updated : 2012-06-20 21:00
NVD link : CVE-2012-2493
Mitre link : CVE-2012-2493
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apple
- mac_os_x
cisco
- anyconnect_secure_mobility_client
microsoft
- windows
linux
- linux_kernel