Cisco AnyConnect Secure Mobility Client 4.1(8) on OS X and Linux does not verify pathnames before installation actions, which allows local users to obtain root privileges via a crafted installation file, aka Bug ID CSCuv11947.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1033656 | vdb entry third party advisory |
http://www.securityfocus.com/archive/1/536534/100/0/threaded | mailing list |
https://www.exploit-db.com/exploits/38303/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/133685/Cisco-AnyConnect-DMG-Install-Script-Privilege-Escalation.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2015/Sep/86 | mailing list vdb entry third party advisory |
http://tools.cisco.com/security/center/viewAlert.x?alertId=41135 | vendor advisory |
https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_%20of_privileges_via_dmg_install_script.html | third party advisory patch |