Secunia Security Advisory - A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.
21485763816abefeb0768cdab4cd7bbdaea39afe598e1ee3d6c08e7b7605cb17
----------------------------------------------------------------------
Are you missing:
SECUNIA ADVISORY ID:
Critical:
Impact:
Where:
within the advisory below?
This is now part of the Secunia commercial solutions.
Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/
Click here to trial our solutions:
http://secunia.com/advisories/try_vi/
----------------------------------------------------------------------
TITLE:
CiscoWorks TFTP Directory Traversal Vulnerability
SECUNIA ADVISORY ID:
SA35179
VERIFY ADVISORY:
http://secunia.com/advisories/35179/
DESCRIPTION:
A vulnerability has been reported in various Cisco products, which
can be exploited by malicious people to disclose sensitive
information or compromise a vulnerable system.
The vulnerability is caused due an input validation error within the
TFTP service and can be exploited to download or manipulate files in
arbitrary locations outside the TFTP root via specially crafted
directory traversal sequences.
The vulnerability is reported in the following products running
CiscoWorks Common Services versions 3.0.x, 3.1.x, and 3.2.x for
Windows:
* Cisco Unified Service Monitor versions 1.0, 1.1, 2.0, and 2.1
* CiscoWorks QoS Policy Manager versions 4.0 and 4.1
* CiscoWorks LAN Management Solution versions 2.5, 2.6, 3.0, and 3.1
* Cisco Security Manager versions 3.0, 3.1, and 3.2
* Cisco TelePresence Readiness Assessment Manager version 1.0
* CiscoWorks Voice Manager versions 3.0 and 3.1
* CiscoWorks Health and Utilization Monitor versions 1.0 and 1.1
* Cisco Unified Operations Manager versions 1.0, 1.1, 2.0, and 2.1
* Cisco Unified Provisioning Manager versions 1.0, 1.1, 1.2, and 1.3
SOLUTION:
Apply patch (cwcs3.x-win-CSCsx07107-0.zip).
http://www.cisco.com/pcgi-bin/tablebuild.pl/cw2000-cd-one
PROVIDED AND/OR DISCOVERED BY:
Reported to the vendor by a customer.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20090520-cw.shtml
http://www.cisco.com/warp/public/707/cisco-amb-20090520-cw.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------