-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3055
                          cisco-sa-20171129-webex
                             30 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco WebEx
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12372 CVE-2017-12371 CVE-2017-12370
                   CVE-2017-12369 CVE-2017-12368 CVE-2017-12367
                   CVE-2017-12366 CVE-2017-12365 CVE-2017-12363
                   CVE-2017-12360 CVE-2017-12359 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex1
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex3
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex4
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex5

Comment: This bulletin contains six (6) security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Medium
 
Advisory ID:
 
cisco-sa-20171129-webex

First Published:
2017 November 29 16:00  GMT
 
 Version 1.0:
 
Final

 Workarounds:
 
No workarounds available

Cisco Bug IDs:
CSCve10729
CSCve10771
CSCve10779
CSCve10729
CSCve10771
CSCve10779
CSCve11521
CSCve11543
CVE-2017-12359
CWE-119
CVSS Score:
 Base 6.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
 
 Summary
 
A vulnerability in Cisco WebEx Network Recording Player for Advanced
Recording Format (.arf) files could allow an attacker to execute
arbitrary code on a system. An attacker could exploit this
vulnerability by providing a user with a malicious .arf file via email
or URL and convincing the user to launch the file.
Exploitation of this vulnerability could allow arbitrary code
execution on the system of the targeted user.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex

 Affected Products
 
 Vulnerable Products
 
This vulnerability affects Cisco WebEx Business Suite meeting sites,
Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco
WebEx ARF players. For information about affected software releases,
consult the Cisco bug at the top of this advisory.

 Products Confirmed Not Vulnerable
 
No other Cisco products are currently known to be affected by this
vulnerability.

 Workarounds
 
There are no workarounds that address this vulnerability.

 Fixed Software
 
For information about fixed software releases, consult the Cisco bug
ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.

 Exploitation and Public Announcements
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

 Source
 
This vulnerability was reported to Cisco by Kushal Arvind Shah of
Fortinets Fortiguard Team.

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29

 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- -------------------------------------------------------------------------

Medium

 Advisory ID:
 
cisco-sa-20171129-webex1

First Published:
2017 November 29 16:00  GMT
 
 Version 1.0:
 
Final

 Workarounds:
 
No workarounds available

Cisco Bug IDs:
CSCve30294
CSCve30301
CVE-2017-12360
CWE-399
CVSS Score:
 Base 4.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:X/RC:X

 Summary
 
A vulnerability in Cisco WebEx Network Recording Player for WebEx
Recording Format (WRF) files could allow an attacker to cause a denial
of service (DoS) condition. An attacker could exploit this
vulnerability by providing a user with a malicious WRF file via email
or URL and convincing the user to open the file. A successful exploit
could cause an affected player to crash, resulting in a DoS condition.
Cisco WebEx players are applications that are used to play back WebEx
meeting recordings that have been recorded by an online meeting
attendee. The player can be automatically installed when the user
accesses a recording file that is hosted on a WebEx server.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex1
 
Affected Products
 
 Vulnerable Products
 
This vulnerability affects Cisco WebEx Business Suite meeting sites,
Cisco WebEx Meetings sites, and Cisco WebEx WRF players. For
information about affected software releases, consult the Cisco bug at
the top of this advisory.

Products Confirmed Not Vulnerable
 
No other Cisco products are currently known to be affected by this
vulnerability.
Cisco has confirmed that this vulnerability does not affect WebEx
Meetings Server.

 Workarounds
 
There are no workarounds that address this vulnerability.

 Fixed Software
 
At the time of publication, fixed software had been provided to the
Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites,
and Cisco WebEx WRF players service for this vulnerability. For the
latest and most detailed information about fixed software releases,
consult the Cisco bug ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.

 Exploitation and Public Announcements
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

 Source
 
Cisco would like to thank Yihan Lian of Qihoo 360 GearTeam for
reporting this vulnerability.

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex1

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29

 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- --------------------------------------------------------------------

Critical

 Advisory ID:
 
cisco-sa-20171129-webex-players

First Published:
2017 November 29 16:00  GMT
Last Updated: 
2017 November 29 16:45  GMT
 
 Version 1.1:
 
Final

 Workarounds:
 
No workarounds available

Cisco Bug IDs:
CSCve02843
CSCve10584
CSCve10591
CSCve02843
CSCve10584
CSCve10591
CSCve10658
CSCve10744
CSCve10749
CSCve10762
CSCve10764
CSCve11503
CSCve11507
CSCve11532
CSCve11538
CSCve11545
CSCve11548
CSCve30208
CSCve30214
CSCve30268
CSCvf38060
CSCvf38077
CSCvf38084
CSCvf49650
CSCvf49697
CSCvf49707
CSCvf57234
CSCvg54836
CSCvg54843
CSCvg54850
CSCvg54853
CSCvg54856
CSCvg54861
CSCvg54867
CSCvg54868
CSCvg54870
CVE-2017-12367
CVE-2017-12368
CVE-2017-12369
CVE-2017-12367
CVE-2017-12368
CVE-2017-12369
CVE-2017-12370
CVE-2017-12371
CVE-2017-12372
CWE-119
CWE-125
CWE-20

CVSS Score:
 Base 9.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:X/RL:X/RC:X

 Summary
 
Multiple vulnerabilities exist in Cisco WebEx Network Recording Player
for Advanced Recording Format (ARF) and WebEx Recording Format (WRF)
files. A remote attacker could exploit these vulnerabilities by
providing a user with a malicious ARF or WRF file via email or URL and
convincing the user to launch the file. Exploitation of these
vulnerabilities could cause an affected player to crash and, in some
cases, could allow arbitrary code execution on the system of a
targeted user.
The Cisco WebEx players are applications that are used to play back
WebEx meeting recordings that have been recorded by an online meeting
attendee. The player can be automatically installed when the user
accesses a recording file that is hosted on a WebEx server.
Cisco has updated affected versions of the Cisco WebEx Business Suite
meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings
Server, and Cisco WebEx ARF and WRF Players to address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.
This advisory is available at the following link: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex-players

 Affected Products
 
 Vulnerable Products
 
The vulnerabilities disclosed in this advisory affect the Cisco WebEx
ARF Player and the Cisco WebEx WRF Player. The following client builds
of Cisco WebEx Business Suite (WBS30, WBS 31, and WBS32), Cisco WebEx
Meetings, and Cisco WebEx Meetings Server are affected by at least one
of the vulnerabilities described in this advisory:
Cisco WebEx Business Suite (WBS30) client builds prior to T30.20
Cisco WebEx Business Suite (WBS31) client builds prior to T31.14.1
Cisco WebEx Business Suite (WBS32) client builds prior to T32.2
Cisco WebEx Meetings with client builds prior to T31.14
Cisco WebEx Meeting Server builds prior to 2.7MR3
To determine whether a Cisco WebEx meeting site is running an affected
version of the WebEx client build, users can log in to their Cisco
WebEx meeting site and go to the Support > Downloads section. The
version of the WebEx client build will be displayed on the right side
of the page under About Meeting Center. See the Fixed Software section
for details.
Alternatively, version information of the Cisco WebEx meeting client
can be accessed from within the Cisco WebEx meeting client. Version
information for the Cisco WebEx meeting client on Windows and Linux
platforms can be viewed by choosing Help > About Cisco WebEx Meeting
Center. Version information for the Cisco WebEx meeting client on Mac
platforms can be viewed by choosing Meeting Center > About Cisco WebEx
Meeting Center.
The Cisco WebEx software updates are cumulative in client builds. For
example, if client build 30.32.16 is fixed, build 30.32.17 will
contain updated software. Cisco WebEx site administrators have access
to secondary version nomenclature, for example, T30 SP32 EP 16, which
shows that the server is running client build 30.32.16.
Note: Customers who do not receive automatic software updates may be
running versions of Cisco WebEx that have reached end of software
maintenance and should contact customer support.

 Products Confirmed Not Vulnerable
 
No other Cisco products are currently known to be affected by these
vulnerabilities.

 Details
 
The Cisco WebEx Business Suite (WBS) meeting services and Cisco WebEx
Meetings are a hosted multimedia conferencing solution that is managed
and maintained by Cisco WebEx. The Cisco WebEx Meetings Server is a
multimedia conferencing solution that customer can host in their
private clouds.
The ARF and WRF file formats are used to store WebEx meeting
recordings that have been recorded on a WebEx meeting site, or on the
computer of an online meeting attendee.
The Cisco WebEx ARF Player and the Cisco WebEx WRF Player are
applications that are used to play back and edit WebEx ARF and WRF
recording files (files with .arf and .wrf extensions).
The Cisco WebEx ARF Player and Cisco WebEx WRF Player can be
automatically installed when a user accesses a recording file that is
hosted on a WebEx meeting site (for streaming playback mode). The
Cisco WebEx ARF Player and Cisco WebEx WRF Player can also be manually
installed after downloading the application from
http://www.webex.com/play-webex-recording.html to play back recording
files for offline playback.
The Cisco WebEx ARF Player is available for all Cisco WebEx meeting
site clients (WBS30, WBS31, WBS32, and WebEx Meetings) and for Cisco
WebEx Meetings Server clients. The Cisco WebEx WRF Player is only
available for Cisco WebEx WBS30, WBS 31, and WBS32 meeting site
clients and is not available for the Cisco WebEx Meetings or Cisco
WebEx Meetings Server clients.
The following table provides the Cisco bug IDs and Common
Vulnerabilities and Exposures (CVE) identifiers that have been
assigned for the vulnerabilities in this advisory:
            Title              CVE ID                  Cisco Bug ID
    Cisco WebEx Network
    Recording Player        CVE-2017-12367 		CSCve11545, CSCve02843, CSCve11548
    Denial of Service
    Vulnerability
    Cisco WebEx Network                    		CSCve10584, CSCve10591, CSCve11503,
    Recording Player        CVE-2017-12368 		CSCve10658, CSCve11507, CSCve10749,
    Remote Code Execution                 		 CSCve10744, CSCve11532, CSCve10762,
    Vulnerability                          		CSCve10764, CSCve11538
    Cisco WebEx Network
    Recording Player        CVE-2017-12369 		CSCve30208, CSCve30214, CSCve30268
    Out-of-Bounds
    Vulnerability
    Cisco WebEx Network
    Recording Player        CVE-2017-12370 		CSCvf38060, CSCvg54836, CSCvf38077,
    Remote Code Execution                  		CSCvg54843, CSCvf38084, CSCvg54850
    Vulnerability
    Cisco WebEx Network                    		CSCvf49650, CSCvg54853, CSCvg54856,
    Recording Player        CVE-2017-12371 		CSCvf49697, CSCvg54861, CSCvf49707,
    Remote Code Execution                  		CSCvg54867
    Vulnerability
    Cisco WebEx Network
    Recording Player        CVE-2017-12372 		CSCvf57234, CSCvg54868, CSCvg54870
    Remote Code Execution
    Vulnerability
Exploitation of these vulnerabilities may cause player applications to
crash or, in some cases, execute malicious code from a remote
attacker.
To exploit these vulnerabilities, the player application would need to
open a malicious ARF or WRF file. An attacker may be able to
accomplish this exploit by providing the malicious recording file
directly to users (for example, by using email), or by directing a
user to a malicious web page. The vulnerabilities cannot be triggered
by users who are attending a WebEx meeting.

 Workarounds
 
There are no workarounds that address these vulnerabilities. However,
it is possible to remove all WebEx software completely from a system
using the Meeting Services Removal Tool (for Microsoft Windows users)
or Mac WebEx Meeting Application Uninstaller (for Apple Mac OS X
users) available for download from the Cisco Collaboration Help for
Cisco Spark, WebEx, and Jabber article at
https://collaborationhelp.cisco.com/article/en-us/WBX000026396.
Removal of the WebEx software from a Linux or UNIX-based system can be
accomplished by following the steps in the Cisco Collaboration Help
for Cisco Spark, WebEx, and Jabber article:
https://collaborationhelp.cisco.com/article/en-us/WBX28548.

 Fixed Software
 
Cisco has released free software updates that address the
vulnerability described in this advisory. Customers may only install
and expect support for software versions and feature sets for which
they have purchased a license. By installing, downloading, accessing,
or otherwise using such software upgrades, customers agree to follow
the terms of the Cisco software license:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
Additionally, customers may only download software for which they have
a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a
maintenance upgrade to software that was previously purchased. Free
security software updates do not entitle customers to a new software
license, additional software feature sets, or major revision upgrades.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to upgrade
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of
entitlement to a free upgrade.

Fixed Releases
The following client builds of Cisco WebEx Business Suite (WBS30,
WBS31, WBS32), Cisco WebEx Meetings, and Cisco WebEx Meetings Server
address the vulnerabilities described in this advisory:
Cisco WebEx Business Suite (WBS30) client builds T30.20 and later
Cisco WebEx Business Suite (WBS31) client builds T31.14 and later
Cisco WebEx Business Suite (WBS32) client builds T32.2 and later
Cisco WebEx Meetings with client builds T31.14 and later
Cisco WebEx Meeting Server builds 2.7MR3 and later

To determine whether a Cisco WebEx meeting site is running an affected
version of the WebEx client build, users can log in to their Cisco
WebEx meeting site and go to the Support > Downloads section. The
version of the WebEx client build will be displayed on the right side
of the page under About Meeting Center. The Cisco WebEx software
updates are cumulative in client builds. For example, if client build
30.32.16 is fixed, build 30.32.17 will contain updated software.
The vulnerabilities disclosed in this advisory affect the Cisco WebEx
ARF and WRF Players. The Microsoft Windows, Apple Mac OS X, and Linux
versions of the players are all affected by at least one vulnerability
described in this advisory. If the Cisco WebEx ARF Player or the Cisco
WebEx WRF Player was automatically installed, it will be automatically
upgraded to the latest, non-vulnerable version when users access a
recording file that is hosted on a WebEx meeting site. If the Cisco
WebEx ARF Player or the Cisco WebEx WRF Player was manually installed,
users will need to manually install a new version of the player after
downloading the latest version from http://www.webex.com/play-webex-
recording.html.
Users can manually verify the installed version of the Cisco WebEx ARF
Player or the Cisco WebEx WRF Player to determine whether they are
affected by these vulnerabilities.
NOTE: Users whose WebEx Business Suites are on lockdown will need to
contact WebEx Support to apply the appropriate patch to their WebEx
site.
    Cisco Bug ID                    First Fixed Release
                 WBS30   WBS31   WBS32 WebEx Meetings WebEx Meetings Server
    CSCve11545                                        2.7MR3
                                                      2.8MR1
    CSCve02843   T30.20 T31.14   T32.2                 
    CSCve11548                         T30.20          
                                       T32.2
    CSCve10584          T31.14.4 T32.3                 
                        T31.15
    CSCve10591                                        2.7MR3
                                                      2.8MR1
    CSCve11503                         T32.3           
    CSCve10658          T31.14.4 T32.4                 
    CSCve11507                         T32.3           
    CSCve10749                                        2.7MR3
                                                      2.8MR1
    CSCve10744          T31.14.4 T32.2                 
    CSCve11532                         T32.2           
    CSCve10762                   T32.4                 
    CSCve10764                                        3.0
    CSCve11538                         T32.2           
                        T31.14.4 T32.3
    CSCve30208          T31.15   T32.6                 
                        T31.17.2
    CSCve30214                                        2.7MR3
                                                      2.8MR1
    CSCve30268                         T32.4           
                                       T32.6
    CSCvf38060          T31.17   T32.5                 
    CSCvg54836                         T32.7           
    CSCvf38077          T31.17   T32.5                 
    CSCvg54843                         T32.7           
    CSCvf38084          T31.17   T32.5                 
    CSCvg54850                         T32.7           
    CSCvf49650          T31.20   T32.6                 
    CSCvg54853                                        3.0
    CSCvg54856                         T32.7           
    CSCvf49697          T31.20   T32.6                 
    CSCvg54861                         T32.7           
    CSCvf49707          T31.20   T32.7                 
    CSCvg54867                         T32.7           
    CSCvf57234          T31.17.2 T32.6                 
    CSCvg54868                                        3.0
    CSCvg54870                         T32.7           

 
 Exploitation and Public Announcements
 
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.
 
Source
 
These vulnerabilities were reported to Cisco by Yihan Lian, Fortinet,
and Trend Micro as follows:

                    Cisco Bug IDs                            Reporter
    CSCve11545, CSCve02843, CSCve11548,            Yihan Lian
    CSCve30208, CSCve30214, CSCve30268
    CSCve10584, CSCve10591, CSCve11503,
    CSCve10658, CSCve11507, CSCve10749,            Kushal Arvind Shah of
    CSCve10744, CSCve11532, CSCve10762,            Fortinet's Fortiguard Team
    CSCve10764, CSCve11538
    CSCvf38077, CSCvg54843, CSCvf38060,            Steven Seeley of Offensive
    CSCvg54836, CSCvf38084, CSCvg54850,            Security working with Trend
    CSCvf49650, CSCvg54853, CSCvg54856,            Micro's Zero Day Initiative
    CSCvf49697, CSCvg54861, CSCvf49707, CSCvg54867
    CSCvf57234, CSCvg54868, CSCvg54870             rgod working with Trend
                                                   Micro's Zero Day Initiative

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex-players

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29

 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- --------------------------------------------------------------------------

Medium

 Advisory ID:
 
cisco-sa-20171129-webex3

First Published:
2017 November 29 16:00  GMT
 
 Version 1.0:
 
Final

 Workarounds:

No workarounds available
Cisco Bug IDs:
CSCvf68695
CVE-2017-12363
CWE-264
CVSS Score:
 Base 5.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X

 Summary
 
A vulnerability in Cisco WebEx Meeting Server could allow an
unauthenticated, remote attacker to modify the welcome message of a
meeting on an affected system.
The vulnerability is due to insufficient security settings on
meetings. An attacker could exploit this vulnerability by modifying
the welcome message to a meeting. A successful exploit could allow the
attacker to modify the welcome message of any known meeting.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex3
 Affected Products
 
 Vulnerable Products
 
This vulnerability affects Cisco WebEx Meeting Server. For information
about affected software releases, consult the Cisco bug at the top of
this advisory.
 Products Confirmed Not Vulnerable
 
 No other Cisco products are currently known to be affected by this
vulnerability.

 Workarounds
 
There are no workarounds that address this vulnerability.

 Fixed Software

For information about fixed software releases, consult the Cisco bug
ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.

 Exploitation and Public Announcements
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

 Source
 
This vulnerability was reported to Cisco by Adam Willard of Blue Canopy.

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex3

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29

 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- -------------------------------------------------------------------------

Medium
 
Advisory ID:
 
cisco-sa-20171129-webex4

First Published:
2017 November 29 16:00  GMT
 
 Version 1.0:
 
 Final
 
Workarounds:
 
No workarounds available
Cisco Bug IDs:
CSCvg33629
CVE-2017-12365
CWE-200
CVSS Score:
 Base 4.3
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:X
 
 Summary
 
A vulnerability in Cisco WebEx Event Center could allow an
authenticated, remote attacker to view unlisted meeting information.
The vulnerability is due to a design flaw in the product. An attacker
could execute a query on an Event Center site to view scheduled
meetings. A successful query would show both listed and unlisted
meetings in the displayed information. An attacker could use this
information to attend meetings that are not available for their
attendance.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex4

 Affected Products
 
 Vulnerable Products
 
This vulnerability affects Cisco WebEx Event Center. For information
about affected software releases, consult the Cisco bug at the top of
this advisory.

 Products Confirmed Not Vulnerable
 
No other Cisco products are currently known to be affected by this
vulnerability.

 Workarounds
 
There are no workarounds that address this vulnerability.

 Fixed Software
 
For information about fixed software releases, consult the Cisco bug
ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.

 Exploitation and Public Announcements
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex4

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29

 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- ----------------------------------------------------------------------

Medium

 Advisory ID:
 
cisco-sa-20171129-webex5

First Published:
2017 November 29 16:00  GMT
Last Updated: 
2017 November 29 18:37  GMT
 
 Version 1.1:
 
 
Final

 Workarounds:
 
No workarounds available

Cisco Bug IDs:
CSCvf78635
CSCvg52440
CVE-2017-12366
CWE-79
CVSS Score:
 Base 6.1
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

 Summary
 
A vulnerability in Cisco WebEx Meeting Center could allow an
unauthenticated, remote attacker to conduct a cross-site scripting
(XSS) attack against a user of an affected system.
The vulnerability is due to insufficient input validation of some
parameters that are passed to the web server of the affected system.
An attacker could exploit this vulnerability by convincing a user to
follow a malicious link or by intercepting a user request and
injecting malicious code into the request. A successful exploit could
allow the attacker to execute arbitrary script code in the context of
the affected web interface or allow the attacker to access sensitive
browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex5

 Affected Products
 
 Vulnerable Products
 
This vulnerability affects Cisco WebEx Meeting Center. For information
about affected software releases, consult the Cisco bug at the top of
this advisory.

 Products Confirmed Not Vulnerable
 
No other Cisco products are currently known to be affected by this
vulnerability.

 Workarounds
 
There are no workarounds that address this vulnerability.

 Fixed Software
 
For information about fixed software releases, consult the Cisco bug
ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from
the Cisco Security Advisories and Alerts page, to determine exposure
and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their
contracted maintenance providers.

 Exploitation and Public Announcements
 
The Cisco Product Security Incident Response Team (PSIRT) is not aware
of any public announcements or malicious use of the vulnerability that
is described in this advisory.

 Source
 
This vulnerability was reported to Cisco by Adam Willard of Blue
Canopy and Chacko K. Abraham.

 Cisco Security Vulnerability Policy
 
To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document
also contains instructions for obtaining fixed software and receiving
security vulnerability information from Cisco.

 URL
 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20171129-webex5

Revision History
Version	Description		Section	Status	Date
1.0	Initial public release.		Final	2017-November-29
 Legal Disclaimer
 
THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in
this document is intended for end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWh+fC4x+lLeg9Ub1AQjm2Q//Zi9P1hh8Ol8knAu1kF2Ou30WZuqErBA6
b2YMT5J6Ln3s8DsojY3QfW0OjHtiQIKE/y/7cZRFCiX93RhDLnHq76ZnYFRwj6ac
FQjWSENI0YYa8iHod0X6ImIUcWRfkFAzJmHK1X1ixFX+CwfcdPhRammPKOoanpsF
8tDtm2YcjCSgdLv2Si7iuvmFEhz8SKh09CfSuTw2ICHI1LxnxgJeiJcsmYmGRs1O
5QtWQlP5gD2+79CpikBfgzHAQYkx3eSMM5vUr3+Ugzk2yeDuCVnbDRAdFz+NKLyN
WlYA71iV+7gLOMTLmJ/o8PqEtzWloWQlpHEtTkdzkFX3FUuN48c5U9rMnjyQlvvX
316i4KPJtDXMLSrNZMgRkGythCGng1f3+TwUCEL7mytqbZMtyLQu2Hg9gMPXbIV4
buZ/Jm9echFNOBO/MnyNv8zmk8zySePkiah8ySNUYYOfZgy8+jM8qaMXhlMyMn7j
25uau7MipDh2wGEzbKUYctFQVYxB4lBhVfeSEX46Pl2s3e65C+Gf76P2DhOwcG+O
M0Lnali49gYAPEOI1cmNCTIT5bhsgH+tAVCHRR93KlnthIJnVESEwKDkPwDrhlId
WfYYON7fDAlmfmB73+HBRPDv59+IrwGOp0XBvpNktqiMSkekc4fOyllNM+Vcq2eU
cMEGMJgyDhw=
=CmZI
-----END PGP SIGNATURE-----