VAR-201706-0585
Vulnerability from variot - Updated: 2023-12-18 13:08Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious ARF file via email or URL and convincing the user to launch the file. Exploitation of these vulnerabilities could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. The Cisco WebEx Network Recording Player is an application that is used to play back WebEx meeting recordings that have been recorded on the computer of an online meeting attendee. The player can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The following client builds are affected by this vulnerability: Cisco WebEx Business Suite (WBS29) client builds prior to T29.13.130, Cisco WebEx Business Suite (WBS30) client builds prior to T30.17, Cisco WebEx Business Suite (WBS31) client builds prior to T31.10. Cisco Bug IDs: CSCvc47758 CSCvc51227 CSCvc51242. Vendors have confirmed this vulnerability Bug ID CSCvc47758 , CSCvc51227 ,and CSCvc51242 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. A buffer overflow vulnerability exists in Cisco WebExNetworkRecordingPlayer. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Versions prior to 10
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0585",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webex business suite client",
"scope": "eq",
"trust": 2.7,
"vendor": "cisco",
"version": "0"
},
{
"model": "webex",
"scope": null,
"trust": 2.1,
"vendor": "cisco",
"version": null
},
{
"model": "webex advanced recording format player",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "29.10"
},
{
"model": "webex meetings player t29.10",
"scope": null,
"trust": 0.9,
"vendor": "cisco",
"version": null
},
{
"model": "webex network recording player",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "0"
},
{
"model": "webex advanced recording format player",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "webex arf player",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "29.10_base"
},
{
"model": "webex business suite client t31.10",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "webex business suite client t30.17",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "webex business suite client t29.13.130",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "BID",
"id": "99196"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_advanced_recording_format_player:29.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6669"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Steven Seeley of Source Incite",
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
}
],
"trust": 2.1
},
"cve": "CVE-2017-6669",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-6669",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2017-16244",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-114872",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-6669",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2017-6669",
"trust": 2.1,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-6669",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-16244",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-951",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-114872",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "VULHUB",
"id": "VHN-114872"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious ARF file via email or URL and convincing the user to launch the file. Exploitation of these vulnerabilities could cause an affected player to crash and, in some cases, could allow arbitrary code execution on the system of a targeted user. The Cisco WebEx Network Recording Player is an application that is used to play back WebEx meeting recordings that have been recorded on the computer of an online meeting attendee. The player can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The following client builds are affected by this vulnerability: Cisco WebEx Business Suite (WBS29) client builds prior to T29.13.130, Cisco WebEx Business Suite (WBS30) client builds prior to T30.17, Cisco WebEx Business Suite (WBS31) client builds prior to T31.10. Cisco Bug IDs: CSCvc47758 CSCvc51227 CSCvc51242. Vendors have confirmed this vulnerability Bug ID CSCvc47758 , CSCvc51227 ,and CSCvc51242 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. A buffer overflow vulnerability exists in Cisco WebExNetworkRecordingPlayer. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Versions prior to 10",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "BID",
"id": "99196"
},
{
"db": "VULHUB",
"id": "VHN-114872"
}
],
"trust": 4.41
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6669",
"trust": 5.5
},
{
"db": "BID",
"id": "99196",
"trust": 2.6
},
{
"db": "SECTRACK",
"id": "1038737",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-4277",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-17-442",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-4279",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-17-444",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-4278",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-17-443",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-16244",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-114872",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "VULHUB",
"id": "VHN-114872"
},
{
"db": "BID",
"id": "99196"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"id": "VAR-201706-0585",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "VULHUB",
"id": "VHN-114872"
}
],
"trust": 1.3125
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-16244"
}
]
},
"last_update_date": "2023-12-18T13:08:49.635000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20170621-wnrp",
"trust": 2.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170621-wnrp"
},
{
"title": "Patch for CiscoWebExCiscoWebExNetworkRecordingPlayer Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/98683"
},
{
"title": "Cisco WebEx Network Recording Player Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71173"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114872"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 4.1,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170621-wnrp"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/99196"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1038737"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6669"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6669"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "VULHUB",
"id": "VHN-114872"
},
{
"db": "BID",
"id": "99196"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"db": "VULHUB",
"id": "VHN-114872"
},
{
"db": "BID",
"id": "99196"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"date": "2017-07-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"date": "2017-06-26T00:00:00",
"db": "VULHUB",
"id": "VHN-114872"
},
{
"date": "2017-06-21T00:00:00",
"db": "BID",
"id": "99196"
},
{
"date": "2017-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"date": "2017-06-26T07:29:00.230000",
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"date": "2017-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-442"
},
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"date": "2017-06-23T00:00:00",
"db": "ZDI",
"id": "ZDI-17-443"
},
{
"date": "2017-07-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-16244"
},
{
"date": "2017-07-07T00:00:00",
"db": "VULHUB",
"id": "VHN-114872"
},
{
"date": "2017-06-21T00:00:00",
"db": "BID",
"id": "99196"
},
{
"date": "2017-07-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005144"
},
{
"date": "2021-04-06T13:31:26.063000",
"db": "NVD",
"id": "CVE-2017-6669"
},
{
"date": "2021-04-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco WebEx Network Recording Player ARF File Memory Corruption Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-444"
},
{
"db": "ZDI",
"id": "ZDI-17-443"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-951"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.