Secunia Security Advisory - A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system.
b927a73a5cd00216ecca69b70ff6d2fef38eb2422045ff5be8ff91228bc0fe72
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Cisco Unified Communications Disaster Recovery Framework Command
Execution
SECUNIA ADVISORY ID:
SA29670
VERIFY ADVISORY:
https://secunia.com/advisories/29670/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, System access
WHERE:
>From local network
SOFTWARE:
Cisco Unified Presence 6.x
https://secunia.com/product/14902/
Cisco Unified Communications Manager 6.x
https://secunia.com/product/14776/
Cisco Unified Communications Manager 5.x
https://secunia.com/product/11019/
Cisco Emergency Responder 2.x
https://secunia.com/product/18205/
DESCRIPTION:
A vulnerability has been reported in various Cisco products, which
can be exploited by malicious people to compromise a vulnerable
system.
The vulnerability is caused due to the Disaster Recovery Framework
(DRF) Master not performing authentication on requests received over
the network. This can be exploited to perform any DRF-related tasks
via the DRF Master service (port 4040/TCP).
Successful exploitation allows execution of arbitrary commands.
The vulnerability affects the following products and versions:
* Cisco Unified Communications Manager (CUCM) 5.x and 6.x
* Cisco Unified Communications Manager Business Edition
* Cisco Unified Precense 1.x and 6.x
* Cisco Emergency Responder 2.x
* Cisco Mobility Manager 2.x
SOLUTION:
The vendor has issued updates (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits VoIPshield Systems.
ORIGINAL ADVISORY:
https://www.cisco.com/warp/public/707/cisco-sa-20080403-drf.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------