CERT mailing list archives

Cisco Releases Security Updates for Multiple Products


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Wed, 02 Nov 2016 19:10:48 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

 

Cisco Releases Security Updates for Multiple Products [ 
https://www.us-cert.gov/ncas/current-activity/2016/11/02/Cisco-Releases-Security-Updates-Multiple-Products ] 11/02/2016 
07:00 PM EDT 
Original release date: November 02, 2016

Cisco has released several updates to address vulnerabilities affecting multiple products. A remote attacker could 
exploit some of these vulnerabilities to take control of an affected system.

Users and administrators are encouraged to review the following Cisco Security Advisories and apply the necessary 
updates:


  * Cisco ASR 900 Series Aggregation Services Routers Buffer Overflow Vulnerability [cisco-sa-20161102-tl1 [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1 ]] 
  * Cisco Prime Home Authentication Bypass Vulnerability [cisco-sa-20161102-cph [ 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cph ]] 
  * Cisco Meeting Server Session Description Protocol Media Lines Buffer Overflow Vulnerability [cisco-sa-20161102-cms1 
[ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1 ]] 
  * Cisco Meeting Server and Meeting App Buffer Underflow Vulnerability [cisco-sa-20161102-cms [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms ]] 
  * Vulnerability in Linux Kernel Affecting Cisco Products: October 2016 [cisco-sa-20161026-linux [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux ]] 
  * Cisco TelePresence Endpoints Local Command Injection Vulnerability [cisco-sa-20161102-tp [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp ]] 
  * Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability [cisco-sa-20161102-n9kapic [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-n9kapic ]] 
  * Cisco Email Security Appliance RAR File Attachment Scanner Bypass Vulnerability [cisco-sa-20161102-esa [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-esa ]] 
  * Cisco ASR 5500 Series with DPC2 Cards SESSMGR Denial of Service Vulnerability [cisco-sa-20161102-asr [ 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr ]] 
  * Cisco Email and Web Security Appliance JAR Advanced Malware Protection DoS Vulnerability [cisco-sa-20161026-esawsa3 
[ http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esawsa3 ]] 
________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: