NAVIGATION MAIN MENU

COMPENDIUM LIBRARY/TWITTER MONITOR
VIDEO GALLERY
Economic News
Newsbrief Archives
Democrat Leadership Twitter and Realtime Feeds
Cabinet twitter and realtime feeds
North America weblog
International weblog
Democrats twitter directory
Latest Government Jobs and Public Tenders
Jobs Matrix
Global Travel Information
Pop Entertainment Forum
Start Portal


Please make a donation to support upkeep of the daily news journal, back archives, twitter feeds and the compendium library.










US-CERT Current Activity

Daily newsbrief journal for February 2012, also see http://www.usdemocrats.com/brief for a global 100-page perpetual brief and follow twitter @usdemocrats


US-CERT Current Activity

Postby admin » Wed Feb 29, 2012 7:45 pm

US-CERT Current Activity

Cisco Releases Multiple Security Advisories

Original release date: February 29, 2012 at 3:26 pm
Last revised: February 29, 2012 at 3:26 pm


Cisco has released six security advisories to address vulnerabilities
affecting the following products:
* Cius Wifi devices running Cius Software Version 9.2(1) SR1 and
prior
* Cisco Unified Communications Manager Software versions 6.x, 7.x,
and 8.x
* Cisco Business Edition 3000, 5000, and 6000
* Cisco Unity Connection 7.1 and prior
* Cisco 2000, 2100, 2500, 4100, 4400, and 5500 Series Wireless LAN
Controllers (WLCs)
* Cisco 500 Series Wireless Express Mobility Controllers
* Cisco Wireless Services Modules (WiSM) and (WiSM version 2)
* Cisco NME-AIR-WLC and NM-AIR-WLC Modules for Integrated Services
Routers (ISRs)
* Cisco Catalyst 3750G Integrated WLC
* Cisco Flex 7500 Series Cloud Controllers
* Control, Expressway, and Starter Pack Express variants of Cisco
TelePresence Video Communication Server
* Cisco SRP 521W, 526W, and 527W
* Cisco SRP 521W-U, 526W-U, and 527W-U
* Cisco SRP 541W, 546W, and 547W

These vulnerabilities may allow an attacker to execute arbitrary code,
cause a denial-of-service condition, operate with escalated privileges
and bypass security restrictions.

US-CERT encourages users and administrators to review Cisco security
advisories cisco-sa-20120229-cius, cisco-sa-201202290-cucm, cisco-sa-2
01202290-cuc, cisco-sa-201202290-wlc, cisco-sa-201202290-vcs, and
cisco-sa-201202290-srp500 and apply any necessary updates to help
mitigate the risk.

Relevant Url(s):
<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cius>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-vcs>

<http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc>

====
This entry is available at
http://www.us-cert.gov/current/index.ht ... dvisories5
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am

Return to February 2012

Who is online

Users browsing this forum: No registered users and 5 guests

cron