CERT mailing list archives

Current Activity - Cisco Releases Multiple Security Advisories


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 29 Feb 2012 15:32:18 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Cisco Releases Multiple Security Advisories

Original release date: February 29, 2012 at 3:26 pm
Last revised: February 29, 2012 at 3:26 pm


Cisco has released six security advisories to address vulnerabilities
affecting the following products:
  * Cius Wifi devices running Cius Software Version 9.2(1) SR1 and
    prior
  * Cisco Unified Communications Manager Software versions 6.x, 7.x,
    and 8.x
  * Cisco Business Edition 3000, 5000, and 6000
  * Cisco Unity Connection 7.1 and prior
  * Cisco 2000, 2100, 2500, 4100, 4400, and 5500 Series Wireless LAN
    Controllers (WLCs)
  * Cisco 500 Series Wireless Express Mobility Controllers
  * Cisco Wireless Services Modules (WiSM) and (WiSM version 2)
  * Cisco NME-AIR-WLC and NM-AIR-WLC Modules for Integrated Services
    Routers (ISRs)
  * Cisco Catalyst 3750G Integrated WLC
  * Cisco Flex 7500 Series Cloud Controllers
  * Control, Expressway, and Starter Pack Express variants of Cisco
    TelePresence Video Communication Server
  * Cisco SRP 521W, 526W, and 527W
  * Cisco SRP 521W-U, 526W-U, and 527W-U
  * Cisco SRP 541W, 546W, and 547W

These vulnerabilities may allow an attacker to execute arbitrary code,
cause a denial-of-service condition, operate with escalated privileges
and bypass security restrictions.

US-CERT encourages users and administrators to review Cisco security
advisories cisco-sa-20120229-cius, cisco-sa-201202290-cucm, cisco-sa-2
01202290-cuc, cisco-sa-201202290-wlc, cisco-sa-201202290-vcs, and
cisco-sa-201202290-srp500 and apply any necessary updates to help
mitigate the risk.

Relevant Url(s):
<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cius>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-vcs>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc>

====
This entry is available at
http://www.us-cert.gov/current/index.html#cisco_releases_multiple_security_advisories5

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBT06LST/GkGVXE7GMAQKXdggAsSfvHi1boESNmU+whiuKu6mnnYfIB1tr
jstrNjmsX+5JXsNtrkDNprcblCGp49eXwM5SIJoF5OnKByVbitw9j0poSCP3rGQo
onzcvM/bBo05IstxmOz8gLT1r0KWqbieekzJ2t/keI2Ank0nQeKD7A8TCvSL8gK8
GQy8E/MO6uawh5wUJP2d+VJOCWRT9Bo4MDXzwC1pTDk/0OTsKjW3VfOtZoZQjhQZ
81q9fXeXi62YUhtuBrqKHKELUreGz5t2ZtMMh7YwUH5vFLe+G3lLiHI46m0EfnM4
z9rJbwLWqKINe3KCxWS9EFpXFsu3m7hEn2iGs4UQaehpvkbFYmRbMA==
=IqYo
-----END PGP SIGNATURE-----


Current thread: