<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
"allow an unprivileged, local attacker to execute arbitrary code"<br>
<br>
There is no allowance on the appliance for any user to install 3rd
party software or execute an arbitrary binary. I expect a fix to come
out in the form of an upgrade to a later version such as 6.1.4 or
7.1.3. However details are not yet ironed out and published. With no
opportunity for exploit it will not be urgent priority on the
appliance. On other platforms that allow arbitrary execution it will
be high priority.<br>
<br>
/Wes<br>
<br>
On Thursday, August 27, 2009 12:53:03 PM , Ted Nugent
<a class="moz-txt-link-rfc2396E" href="mailto:tednugent73@gmail.com"><tednugent73@gmail.com></a> wrote:<br>
<blockquote
cite="mid:22e6380b0908270953g97ad22bg86cfa93c9b61b0d0@mail.gmail.com"
type="cite">I believe Billy is referring to the Alert below
<div>
<p class="MsoPlainText"><a moz-do-not-send="true"
href="http://tools.cisco.com/security/center/viewAlert.x?alertId=18847">http://tools.cisco.com/security/center/viewAlert.x?alertId=18847</a></p>
<p class="MsoPlainText"><br>
</p>
<p class="MsoPlainText"><br>
</p>
<br>
<div class="gmail_quote">On Thu, Aug 27, 2009 at 10:05 AM, Wes Sisk <span
dir="ltr"><<a moz-do-not-send="true" href="mailto:wsisk@cisco.com">wsisk@cisco.com</a>></span>
wrote:<br>
<blockquote class="gmail_quote"
style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div bgcolor="#ffffff" text="#000000">
Can you provide more info on this vulnerability? Generally there is no
'patching' on the appliance. Patches are distributed via an upgrade to
a subsequent version.<br>
<br>
/Wes
<div class="im"><br>
<br>
On Thursday, August 27, 2009 8:37:03 AM , Billy Poole
<a moz-do-not-send="true" href="mailto:bpoole31@gmail.com"
target="_blank"><bpoole31@gmail.com></a> wrote:<br>
</div>
<blockquote type="cite">
<div class="im">I wanted to know if any one has applied the patch
for this
on CUCM 6x and or any other VOIP Linux systems? If so what steps did
you take? Thanks. </div>
<pre><hr size="4" width="90%">
_______________________________________________
cisco-voip mailing list
<a moz-do-not-send="true" href="mailto:cisco-voip@puck.nether.net"
target="_blank">cisco-voip@puck.nether.net</a>
<a moz-do-not-send="true"
href="https://puck.nether.net/mailman/listinfo/cisco-voip"
target="_blank">https://puck.nether.net/mailman/listinfo/cisco-voip</a>
</pre>
</blockquote>
<br>
</div>
<br>
_______________________________________________<br>
cisco-voip mailing list<br>
<a moz-do-not-send="true" href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</a><br>
<a moz-do-not-send="true"
href="https://puck.nether.net/mailman/listinfo/cisco-voip"
target="_blank">https://puck.nether.net/mailman/listinfo/cisco-voip</a><br>
<br>
</blockquote>
</div>
<br>
</div>
</blockquote>
<br>
</body>
</html>