Release date:
Updated on:
Affected Systems:
Cisco Secure Desktop 3.5.841
Cisco Secure Desktop 3.5.841
Cisco Secure Desktop 3.5.1077
Cisco Secure Desktop 3.4.2048
Cisco Secure Desktop 3.2
Cisco Secure Desktop 3.1.1.45
Cisco Secure Desktop 3.1.1.33
Cisco Secure Desktop 3.1.1
Cisco Secure Desktop 3.1
Description:
--------------------------------------------------------------------------------
Bugtraq id: 46536
Cve id: CVE-2011-0926
Cisco Secure Desktop can reduce the amount of data that can be accessed from a company's PC, from a personal network to a device, or from a public terminal, for example, Cookie, browser history, temporary files, and downloaded content left after the ssl vpn session is terminated. By integrating with the Cisco NAC device and the Cisco NAC framework, you can also fully check the network access user's endpoint status.
Cisco Secure Desktop has a security vulnerability. Attackers can exploit this vulnerability to upload and download malicious files and execute arbitrary code as the current user.
This vulnerability is caused by the CSDWebInstaller. ocx ActiveX Control. When verifying the signing name in the certificate chain, it incorrectly verifies the digital signature of the executable file downloaded and executed by the Cisco Secure Desktop installation process.
<* Link: http://www.zerodayinitiative.com/advisories/ZDI-11-092/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Cisco
-----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.cisco.com/warp/public/707/advisory.html