-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Cisco IronPort Appliances Telnet Remote Code Execution Vulnerability Advisory ID: cisco-sa-20120126-ironport http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120126-ironport Revision 2.0 Last Updated 2014 October 16 13:40 UTC (GMT) For Public Release 2012 January 26 17:00 UTC (GMT) +--------------------------------------------------------------------- Summary ======= Cisco AsyncOS Software for Cisco Web Security Appliance (WSA), Cisco Email Security Appliance (ESA), and Cisco Content Security Management Appliance (SMA) contain a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code with elevated privileges. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. Note: This security advisory has been updated to include important information about Cisco WSA This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120126-ironport -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (SunOS) iQIVAwUBVD/SX4pI1I6i1Mx3AQI3uxAAoomtbVBoF6/e3zVswST5DDoYvP+quQJy FJp4nO1FCeEZr9k+4v2zHN2gf8JGF/fRhdvfTFk+ZGlm0eVzZ27SJt0k05szAl9F T6FFiwv8rbxaax1zFDvoiBblTnJYATpgPef4Gbp/pMtV+h5iEIXEclknejAxuI1h /WEcO5AEz3moelkc4wLOfsN/8/BFj5Gmu/fnv+9bhsZmPRYlGIh1swD43u0U+42C 7QX70kEOXO7p1pA6oOqpFlrXJAEU5q1D56QXCSejruE9umHLGUfPIndMzC2DzTgv J5GRXiH/HFQx6bBJ3KhC/ZPVlZ5CM9TbNt3aWsZoW2ekpJJ2VC4Noiq2ae7UzsnY r4EmffCN+Lzqx8UExy3FYLt/k043BwrHVr+P1wMfvjIRwnz3oKPuqUA1vdSLxn+s Vf9fXzqxuVm4bMfiAgT3JzRm/Z9m+ZYuPAR5CoDp/TqrKb28t2n59kzvMuT4jzJ9 yos+96pVTEmTcqiixnvvb6oRCfCW7/CotWD+rfc5JJ/ylD3IsNVLo8Me2Mmv7jCi CcCY2sQ5amR8qqY3JXOxfrpcW2AhgBLIwJvMdSt/Q2oDhmS1KwqSLve5nzGMRiy8 p0D3TTnU3ed9gjt3wH7T56UeYgvSK61RpYUBNdrLzzbxvl44T0KfwtZZJt8ogDmy 9vfd06IfcoU= =thvy -----END PGP SIGNATURE-----