9.3

CVE-2017-3823

An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.

Data is provided by the National Vulnerability Database (NVD)
CiscoActivetouch General Plugin Container Version105 SwPlatformfirefox
CiscoDownload Manager Version2.1.0.9 SwPlatforminternet_explorer
CiscoGpccontainer Class SwPlatforminternet_explorer Version <= 10031.6.2017.0125
CiscoWebex SwPlatformchrome Version <= 1.0.6
CiscoWebex Meetings Server Version2.0_base
CiscoWebex Meetings Server Version2.0_mr2
CiscoWebex Meetings Server Version2.0_mr3
CiscoWebex Meetings Server Version2.0_mr4
CiscoWebex Meetings Server Version2.0_mr5
CiscoWebex Meetings Server Version2.0_mr6
CiscoWebex Meetings Server Version2.0_mr7
CiscoWebex Meetings Server Version2.0_mr8
CiscoWebex Meetings Server Version2.0_mr8 Updatep1
CiscoWebex Meetings Server Version2.0_mr9
CiscoWebex Meetings Server Version2.0_mr9 Updatep1
CiscoWebex Meetings Server Version2.0_mr9 Updatep2
CiscoWebex Meetings Server Version2.0_mr9 Updatep3
CiscoWebex Meetings Server Version2.5_base
CiscoWebex Meetings Server Version2.5_mr1
CiscoWebex Meetings Server Version2.5_mr2
CiscoWebex Meetings Server Version2.5_mr2 Updatep1
CiscoWebex Meetings Server Version2.5_mr3
CiscoWebex Meetings Server Version2.5_mr4
CiscoWebex Meetings Server Version2.5_mr5
CiscoWebex Meetings Server Version2.5_mr5 Updatep1
CiscoWebex Meetings Server Version2.5_mr6
CiscoWebex Meetings Server Version2.5_mr6 Updatep1
CiscoWebex Meetings Server Version2.5_mr6 Updatep2
CiscoWebex Meetings Server Version2.5_mr6 Updatep3
CiscoWebex Meetings Server Version2.6_base
CiscoWebex Meetings Server Version2.6_mr1
CiscoWebex Meetings Server Version2.6_mr1 Updatep1
CiscoWebex Meetings Server Version2.6_mr2
CiscoWebex Meetings Server Version2.6_mr2 Updatep1
CiscoWebex Meetings Server Version2.6_mr3
CiscoWebex Meetings Server Version2.6_mr3 Updatep1
CiscoWebex Meetings Server Version2.7_base
CiscoWebex Meetings Server Version2.7_mr1
CiscoWebex Meetings Server Version2.7_mr1 Updatep1
CiscoWebex Meetings Server Version2.7_mr2
CiscoWebex Meeting Center Version2.6_base
CiscoWebex Meeting Center Version2.6_mr1
CiscoWebex Meeting Center Version2.6_mr1 Updatep1
CiscoWebex Meeting Center Version2.6_mr2
CiscoWebex Meeting Center Version2.6_mr2 Updatep1
CiscoWebex Meeting Center Version2.6_mr3
CiscoWebex Meeting Center Version2.6_mr3 Updatep1
CiscoWebex Meeting Center Version2.7_base
CiscoWebex Meeting Center Version2.7_mr1
CiscoWebex Meeting Center Version2.7_mr1 Updatep1
CiscoWebex Meeting Center Version2.7_mr2
CiscoWebex Meeting Center Versiont29_base
CiscoWebex Meeting Center Versiont30_base
CiscoWebex Meeting Center Versiont31_base
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 79.24% 0.99
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.