---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: CiscoWorks TFTP Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA35179 VERIFY ADVISORY: http://secunia.com/advisories/35179/ DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system. The vulnerability is caused due an input validation error within the TFTP service and can be exploited to download or manipulate files in arbitrary locations outside the TFTP root via specially crafted directory traversal sequences. The vulnerability is reported in the following products running CiscoWorks Common Services versions 3.0.x, 3.1.x, and 3.2.x for Windows: * Cisco Unified Service Monitor versions 1.0, 1.1, 2.0, and 2.1 * CiscoWorks QoS Policy Manager versions 4.0 and 4.1 * CiscoWorks LAN Management Solution versions 2.5, 2.6, 3.0, and 3.1 * Cisco Security Manager versions 3.0, 3.1, and 3.2 * Cisco TelePresence Readiness Assessment Manager version 1.0 * CiscoWorks Voice Manager versions 3.0 and 3.1 * CiscoWorks Health and Utilization Monitor versions 1.0 and 1.1 * Cisco Unified Operations Manager versions 1.0, 1.1, 2.0, and 2.1 * Cisco Unified Provisioning Manager versions 1.0, 1.1, 1.2, and 1.3 SOLUTION: Apply patch (cwcs3.x-win-CSCsx07107-0.zip). http://www.cisco.com/pcgi-bin/tablebuild.pl/cw2000-cd-one PROVIDED AND/OR DISCOVERED BY: Reported to the vendor by a customer. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20090520-cw.shtml http://www.cisco.com/warp/public/707/cisco-amb-20090520-cw.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------