The VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 2.x before 2.5 MR6 on Windows, and 2.x before 2.5 MR6 and 3.x before 3.0 MR8 on Mac OS X and Linux, does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug ID CSCtw47523.
                
            References
                    | Link | Resource | 
|---|---|
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory | 
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 01:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac - Vendor Advisory | 
Information
                Published : 2012-06-20 20:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-2493
Mitre link : CVE-2012-2493
CVE.ORG link : CVE-2012-2493
JSON object : View
Products Affected
                apple
- mac_os_x
cisco
- anyconnect_secure_mobility_client
linux
- linux_kernel
microsoft
- windows
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
