|
|
|
|
| |
Credit:
|
| |
Vulnerable Systems:
* Cisco Adaptive Security Appliance Software 7.x
* Cisco Adaptive Security Appliance Software 8.x
The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser
Vendor Status:
Cisco had issued an update for this vulnerability.
Patch Availability:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient
CVE Information:
CVE-2011-0358
Disclosure Timeline:
2012-Mar-14 Initial public release.
|
|
|
|
|