All the vulnerabilites related to cisco - telepresence_mcu_4500_series_software
cve-2015-0621
Vulnerability from cvelistv5
Published
2015-02-18 02:00
Modified
2024-08-06 04:17
Severity ?
Summary
Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:17:32.437Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "72635",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72635"
          },
          {
            "name": "cisco-telepresence-cve20150621-dos(100936)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495"
          },
          {
            "name": "20150217 Cisco TelePresence Multipoint Control Unit Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621"
          },
          {
            "name": "1031756",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031756"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "72635",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72635"
        },
        {
          "name": "cisco-telepresence-cve20150621-dos(100936)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495"
        },
        {
          "name": "20150217 Cisco TelePresence Multipoint Control Unit Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621"
        },
        {
          "name": "1031756",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031756"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2015-0621",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "72635",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/72635"
            },
            {
              "name": "cisco-telepresence-cve20150621-dos(100936)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495"
            },
            {
              "name": "20150217 Cisco TelePresence Multipoint Control Unit Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621"
            },
            {
              "name": "1031756",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031756"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2015-0621",
    "datePublished": "2015-02-18T02:00:00",
    "dateReserved": "2015-01-07T00:00:00",
    "dateUpdated": "2024-08-06T04:17:32.437Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1176
Vulnerability from cvelistv5
Published
2013-04-18 18:00
Modified
2024-09-16 19:52
Severity ?
Summary
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.686Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-04-18T18:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-1176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-1176",
    "datePublished": "2013-04-18T18:00:00Z",
    "dateReserved": "2013-01-11T00:00:00Z",
    "dateUpdated": "2024-09-16T19:52:01.296Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-04-18 18:55
Modified
2024-11-21 01:49
Severity ?
Summary
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448.
Impacted products
Vendor Product Version
cisco telepresence_mcu_4500_series_software *
cisco telepresence_mcu_4500_series_software 4.1\(1.51\)
cisco telepresence_mcu_4500_series_software 4.1\(1.59\)
cisco telepresence_mcu_4500_series_software 4.2\(1.43\)
cisco telepresence_mcu_4500_series_software 4.2\(1.46\)
cisco telepresence_mcu_4500_series_software 4.2\(1.50\)
cisco telepresence_mcu_4500_series_software 4.3\(1.68\)
cisco telepresence_mcu_4505 -
cisco telepresence_mcu_4510 -
cisco telepresence_mcu_4515 -
cisco telepresence_mcu_4520 -
cisco telepresence_mcu_4501_series_software *
cisco telepresence_mcu_4501_series_software 4.1\(1.51\)
cisco telepresence_mcu_4501_series_software 4.1\(1.59\)
cisco telepresence_mcu_4501_series_software 4.2\(1.43\)
cisco telepresence_mcu_4501_series_software 4.2\(1.46\)
cisco telepresence_mcu_4501_series_software 4.2\(1.50\)
cisco telepresence_mcu_4501_series_software 4.3\(1.68\)
cisco telepresence_mcu_4501 -
cisco telepresence_mcu_mse_series_software *
cisco telepresence_mcu_mse_series_software 4.1\(1.51\)
cisco telepresence_mcu_mse_series_software 4.1\(1.59\)
cisco telepresence_mcu_mse_series_software 4.2\(1.43\)
cisco telepresence_mcu_mse_series_software 4.2\(1.46\)
cisco telepresence_mcu_mse_series_software 4.2\(1.50\)
cisco telepresence_mcu_mse_series_software 4.3\(1.68\)
cisco telepresence_mcu_mse_8510 -
cisco telepresence_server_software *
cisco telepresence_server_software 2.1\(1.33\)
cisco telepresence_server_software 2.1\(1.37\)
cisco telepresence_server_software 2.2\(1.43\)
cisco telepresence_server_7010 -
cisco telepresence_server_mse_8710 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8F4FBB-E964-4321-AB35-E16ABA3F5034",
              "versionEndIncluding": "4.3\\(2.18\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "795D8FB0-600A-4EF1-B97E-55B526AA5505",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFEEEBC8-9B0D-4B17-827A-FBEA7643AB86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "124EDEE8-9515-4178-AFC0-B1F2FA34388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AB48A28E-4BBD-477B-A96B-B99879198583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0C6D91-2585-4531-AA86-1DBDE85F6B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4D00A572-D5EC-4186-809B-4C66E9147F91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5574D81E-25A1-477A-978C-109D667771A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96560014-147A-4AE1-A215-E2F04B3AD7C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4515:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72129DF6-D50B-46D8-84EA-95E65D86FF62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C64580-60FB-40CB-968A-1737E59A1E6F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57751069-E382-4004-8B76-5296243F43A7",
              "versionEndIncluding": "4.3\\(2.18\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A667D636-560E-4CED-864E-B23AEC62C1F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F3A8B1D8-1CF0-4B3B-A9C9-581199F24588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7E57DAE9-4E29-4585-AEE5-B4806A9429AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "053A2E65-8427-43DE-B126-744EDCE7767A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BEE259-94FF-4C6C-8881-D39B44C241CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "41C17A23-E669-4D11-AC8F-ACBBC7D94A0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B739B1A-89D5-48EF-829E-E52AF298D840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55AE599-11DB-4688-A384-D11CC31247A1",
              "versionEndIncluding": "4.3\\(2.18\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3494A9FA-2470-4A8D-A2ED-40A8711961F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BC10B558-661C-4AB8-97C8-7CE6FDBD6262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5112E0B4-690D-4159-A1A8-7078FACF25BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CADE4238-16ED-4D5C-AD8A-EFB63511E034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C33BCB3F-9C7F-478A-BC9B-BD6935FF2E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC9217A-F120-4811-B854-3DDA58E27FF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_mcu_mse_8510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738ED7C7-98D6-4BD5-9115-48405F350CC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_server_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E008F3-B240-4699-A7E2-6E3BD1C87812",
              "versionEndIncluding": "2.2\\(1.54\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.33\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4987F125-01CF-4D17-AF4C-E1F4BB977039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.37\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB6EAFBB-5B0A-43E0-A7A7-8B2C17033301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.2\\(1.43\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B029054E-5575-40DA-B9C0-C45A0E938D8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "983E3CC5-7B3A-467A-A482-0D19792CB55E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448."
    },
    {
      "lang": "es",
      "value": "La tarjeta DSP de los dispositivos Cisco TelePresence MCU 4500 y 4501 antes de v4.3(2.30), dispositivos TelePresence MCU MSE 8510 dispositivos antes de v4.3(2.30), y TelePresence Server antes de v2.3(1.55) no valida correctamente los datos de H.264, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga dispositivo) a trav\u00e9s de paquetes hechos a RTP en una (1) sesi\u00f3n de SIP o (2) la sesi\u00f3n H.323, tambi\u00e9n conocido como Bug ID CSCuc11328 y CSCub05448."
    }
  ],
  "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi\r\n\r\n\u0027Vulnerable Products\r\nThe following Cisco TelePresence Infrastructure products are affected by this vulnerability:\r\n\r\n    Cisco TelePresence MCU 4501 Series, MCU 4500 Series and Cisco TelePresence MCU MSE 8510 versions 4.3(2.18) and earlier\r\n    Cisco TelePresence Server versions 2.2(1.54) and earlier\u0027\r\n",
  "id": "CVE-2013-1176",
  "lastModified": "2024-11-21T01:49:03.067",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-04-18T18:55:03.970",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-02-18 02:59
Modified
2024-11-21 02:23
Severity ?
Summary
Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347.
Impacted products
Vendor Product Version
cisco telepresence_mcu_4500_series_software 4.5\(1.45\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.5\\(1.45\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F42A7016-BC4B-4719-85AC-938C463AB560",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347."
    },
    {
      "lang": "es",
      "value": "Los dispositivos Cisco TelePresence MCU con software 4.5(1.45) permiten a atacantes remotos causar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una serie no especificada de paquetes TCP, tambi\u00e9n conocido como Bug ID CSCur50347."
    }
  ],
  "id": "CVE-2015-0621",
  "lastModified": "2024-11-21T02:23:25.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-02-18T02:59:04.737",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/72635"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id/1031756"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/72635"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031756"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-19"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}