Cisco has plugged a buffer overflow flaw involving its popular WebEx online meeting client.
The vulnerability, which involves a bug in an ActiveX control, was revealed in a posting by security researcher Elazar Broad on 6 August, more than a week before Cisco issued an advisory on Friday (15 August). Cisco told Broad it was already aware of the problem and that a fix was already in the works.
Programming errors in the WebexUCFObject ActiveX control create a means for hackers to inject hostile code onto vulnerable systems. Exploitation would involve the standard method of tricking users into visiting maliciously constructed websites, possibly lured there by means of targeted emails aimed at senior execs in particular organisations.
Security clearing house US CERT's summary of the bug can be found here. ®