Vulnerability Description
An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Activetouch General Plugin Container | 105 |
| Cisco | Download Manager | 2.1.0.9 |
| Cisco | Gpccontainer Class | <= 10031.6.2017.0125 |
| Cisco | Webex | <= 1.0.6 |
| Cisco | Webex Meetings Server | 2.0_base |
| Cisco | Webex Meeting Center | 2.6_base |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95737Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037680
- https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html
- https://blog.filippo.io/webex-extension-vulnerability/
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1096Technical DescriptionThird Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1100
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
- https://www.kb.cert.org/vuls/id/909240
- http://www.securityfocus.com/bid/95737Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037680
- https://0patch.blogspot.com/2017/01/micropatching-remote-code-execution-in.html
- https://blog.filippo.io/webex-extension-vulnerability/
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1096Technical DescriptionThird Party Advisory
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1100
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
FAQ
What is CVE-2017-3823?
CVE-2017-3823 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugi...
How severe is CVE-2017-3823?
CVE-2017-3823 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-3823?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Activetouch General Plugin Container, Cisco Download Manager, Cisco Gpccontainer Class, Cisco Webex, Cisco Webex Meetings Server.