All the vulnerabilites related to cisco - telepresence_multipoint_switch_software
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008." }, { "lang": "es", "value": "Java Servlet framework en dispositivos Cisco TelePresence Recording Server devices con software v1.6.x anterior a v1.6.2 y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x no requiere autenticaci\u00f3n administrativa para acciones no especificadas, permitiendo a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n manipulada, tambi\u00e9n conocido como error ID CSCtf42005 and CSCtf42008." } ], "id": "CVE-2011-0383", "lastModified": "2024-11-21T01:23:51.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.603", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46519" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "04A362CA-FBED-46BF-8D1A-B4AA478C03E7", "versionEndIncluding": "1.8.0\\(1026\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*", "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*", "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9", "versionEndIncluding": "1.9.0.1\\(3\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1", "versionEndIncluding": "1.8.1\\(682\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*", "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*", "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*", "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*", "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*", "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*", "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*", "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF", "versionEndIncluding": "1.8.0\\(160\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." }, { "lang": "es", "value": "La implementaci\u00f3n IP en Cisco TelePresence Multipoint Switch anterior a v1.8.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server v1.8 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante (1) un paquete IP mal formado, (2) una elevada cantidad de conexiones TCP, o (3) una elevada cantidad de conexiones de finalizaci\u00f3n TCP, cambien conocido como bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, y CSCty11338." } ], "id": "CVE-2012-3073", "lastModified": "2024-11-21T01:40:11.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.303", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "45E2377D-690A-474E-843A-697DA2BDE7B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "61F55EB7-FF5A-418C-B7B2-F44C5920E266", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825." }, { "lang": "es", "value": "Dispositivos TelePresence Recording Server con software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x y v1.6.x, no restrige correctamente el acceso remoto a la interfaz servlet de Java RMI, permitiendo a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria y corte Web) a trav\u00e9s de m\u00faltiples peticiones manipuladas, tambi\u00e9n conocido como error ID CSCtg35830 y CSCtg35825." } ], "id": "CVE-2011-0388", "lastModified": "2024-11-21T01:23:51.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.900", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46523" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025114" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534." }, { "lang": "es", "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x, v1.6.x, y v1.7.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del proceso) a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como error ID CSCtj44534." } ], "id": "CVE-2011-0390", "lastModified": "2024-11-21T01:23:52.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:19.010", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993." }, { "lang": "es", "value": "Dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x y v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del proceso) a trav\u00e9s de un paquete Real-Time Transport Control Protocol (RTCP) UDP manipulado, tambi\u00e9n conocido como error ID CSCth60993." } ], "id": "CVE-2011-0389", "lastModified": "2024-11-21T01:23:52.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.963", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:39
Severity ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ABAC2DE-6574-4D78-B775-B3A478C0DE84", "versionEndIncluding": "1.8.3\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*", "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*", "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0\\(1026\\):*:*:*:*:*:*:*", "matchCriteriaId": "468F358D-D359-4D06-B6DF-A483BDFD69D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.1\\(1041\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8937CE7-8C1E-40F6-A8E7-2E145E2CCEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "11AAD5AE-CC9E-42C9-AE82-F9AAF8D1A76B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D150A878-0913-4307-ABAA-5456DC20D6C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9", "versionEndIncluding": "1.9.0.1\\(3\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*", "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*", "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*", "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*", "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*", "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*", "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*", "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*", "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*", "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*", "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF71FA2-B8FC-4AE7-A0FD-8A4FAA0FE510", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*", "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1", "versionEndIncluding": "1.8.1\\(682\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*", "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*", "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*", "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*", "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*", "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*", "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*", "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF", "versionEndIncluding": "1.8.0\\(160\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." }, { "lang": "es", "value": "La implementaci\u00f3n del protocolo Cisco Discovery Protocol (CDP) en Cisco TelePresence Multipoint Switch anterior a v1.9.0, Cisco TelePresence Immersive Endpoint Devices anterior a v1.9.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server anterior a v1.8.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de paquetes CDP mal formados, tambi\u00e9n conocido como Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, y CSCtz40953." } ], "id": "CVE-2012-2486", "lastModified": "2024-11-21T01:39:08.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-12T10:34:42.257", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761." } ], "id": "CVE-2011-0379", "lastModified": "2024-11-21T01:23:50.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.383", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025111" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025114" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164." }, { "lang": "es", "value": "La interfaz web de administraci\u00f3n de dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x, y v1.6.x, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio o tener un impacto no especificado a trav\u00e9s de vectores que implican el acceso a un servlet, tambi\u00e9n conocido como error ID CSCtf97164." } ], "id": "CVE-2011-0387", "lastModified": "2024-11-21T01:23:51.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.837", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "45E2377D-690A-474E-843A-697DA2BDE7B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "61F55EB7-FF5A-418C-B7B2-F44C5920E266", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065." }, { "lang": "es", "value": "La interfaz web de administraci\u00f3n de dispositivos Cisco TelePresence Recording Server con el software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x permite a atacantes remotos crear o sobreescribir archivos arbitrarios, y posiblemente ejecutar c\u00f3digo arbitrario, a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como error ID CSCth85786 y CSCth61065." } ], "id": "CVE-2011-0385", "lastModified": "2024-11-21T01:23:51.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.727", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253." }, { "lang": "es", "value": "El Java Servlet framework en dispositivos Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x no requiere autenticaci\u00f3n administrativa para acciones no especificadas, permitiendo a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n manipulada, tambi\u00e9n conocido como error ID CSCtf01253." } ], "id": "CVE-2011-0384", "lastModified": "2024-11-21T01:23:51.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.680", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-3073
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-16 16:52
Severity ?
EPSS score ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3073", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T16:52:38.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0385
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65604 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025114 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "telepresence-interface-file-upload(65604)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "telepresence-interface-file-upload(65604)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "telepresence-interface-file-upload(65604)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" }, { "name": "1025114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0385", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0389
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65622 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/46520 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-multipoint-rtpc-dos(65622)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" }, { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-multipoint-rtpc-dos(65622)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" }, { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-multipoint-rtpc-dos(65622)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" }, { "name": "46520", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0389", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0384
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46520 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65620 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "cisco-switch-java-unauth-access(65620)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "cisco-switch-java-unauth-access(65620)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46520", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46520" }, { "name": "cisco-switch-java-unauth-access(65620)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0384", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0390
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46520 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65623 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-multipoint-xmlrpc-dos(65623)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-multipoint-xmlrpc-dos(65623)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46520", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-multipoint-xmlrpc-dos(65623)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0390", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0387
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65621 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/46520 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-multipoint-interface-dos(65621)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" }, { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-multipoint-interface-dos(65621)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" }, { "name": "46520", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-multipoint-interface-dos(65621)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" }, { "name": "46520", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46520" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0387", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0388
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025114 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/46523 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "46523", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46523" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-11T10:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "46523", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46523" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "46523", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46523" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0388", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0383
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46519 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025114 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65602 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46519", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46519" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-java-unauth-access(65602)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "46519", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46519" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-java-unauth-access(65602)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46519", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46519" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "1025114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "telepresence-java-unauth-access(65602)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0383", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0379
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025111 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025114 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025111", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-18T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025111", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025111", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0379", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2486
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-17 04:25
Severity ?
EPSS score ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-2486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" }, { "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-2486", "datePublished": "2012-07-12T10:00:00Z", "dateReserved": "2012-05-07T00:00:00Z", "dateUpdated": "2024-09-17T04:25:44.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }