All the vulnerabilites related to cisco - telepresence_multipoint_switch_software
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008."
    },
    {
      "lang": "es",
      "value": "Java Servlet framework en dispositivos Cisco TelePresence Recording Server devices con software v1.6.x anterior a v1.6.2 y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x no requiere autenticaci\u00f3n administrativa para acciones no especificadas, permitiendo a  atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n manipulada, tambi\u00e9n conocido como error ID CSCtf42005 and CSCtf42008."
    }
  ],
  "id": "CVE-2011-0383",
  "lastModified": "2024-11-21T01:23:51.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.603",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46519"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:40
Severity ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
Impacted products
Vendor Product Version
cisco telepresence_multipoint_switch_software *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.0.4.0\(21\)
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.0\(254\)
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.1\(30\)
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.1.2\(6\)
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.0\(222\)
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.1\(2\)
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.2\(21\)
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.3.12
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.4\(4\)
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.5\(1\)
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.5.6\(1\)
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.0\(108\)
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.1\(2\)
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.2\(3\)
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.3\(2\)
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch_software 1.6.4\(3\)
cisco telepresence_multipoint_switch_software 1.7.0
cisco telepresence_multipoint_switch_software 1.7.0.1\(5\)
cisco telepresence_multipoint_switch_software 1.7.1\(15\)
cisco telepresence_multipoint_switch_software 1.7.2\(75\)
cisco telepresence_multipoint_switch_software 1.7.3\(2\)
cisco telepresence_multipoint_switch_software 1.8.0
cisco telepresence_multipoint_switch *
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_1300_65 *
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_t3 *
cisco telepresence_system_t3 *
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_manager *
cisco telepresence_manager 1.1.0.0
cisco telepresence_manager 1.1.0.0\(209\)
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.2.0.0\(200\)
cisco telepresence_manager 1.3.2\(466\)
cisco telepresence_manager 1.4.0\(279\)
cisco telepresence_manager 1.5.1\(420\)
cisco telepresence_manager 1.5.2\(423\)
cisco telepresence_manager 1.6.0\(220\)
cisco telepresence_manager 1.6.2\(64\)
cisco telepresence_manager 1.6.3\(113\)
cisco telepresence_manager 1.6.5\(167\)
cisco telepresence_manager 1.7.1\(732\)
cisco telepresence_manager 1.7.2\(256\)
cisco telepresence_manager 1.7.3.1
cisco telepresence_manager 1.7.4
cisco telepresence_manager 1.7.5\(62\)
cisco telepresence_manager 1.8.0\(582\)
cisco telepresence_recording_server *
cisco telepresence_recording_server 1.6.1\(2\)
cisco telepresence_recording_server 1.6.2\(31\)
cisco telepresence_recording_server 1.6.3\(4\)
cisco telepresence_recording_server 1.7.0\(190\)
cisco telepresence_recording_server 1.7.1\(22\)
cisco telepresence_recording_server 1.7.2.1
cisco telepresence_recording_server 1.7.3\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A362CA-FBED-46BF-8D1A-B4AA478C03E7",
              "versionEndIncluding": "1.8.0\\(1026\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9",
              "versionEndIncluding": "1.9.0.1\\(3\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1",
              "versionEndIncluding": "1.8.1\\(682\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF",
              "versionEndIncluding": "1.8.0\\(160\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n IP en Cisco TelePresence Multipoint Switch anterior a v1.8.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server v1.8 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante (1) un paquete IP mal formado, (2) una elevada cantidad de conexiones TCP, o (3) una elevada cantidad de conexiones de finalizaci\u00f3n TCP, cambien conocido como bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, y CSCty11338."
    }
  ],
  "id": "CVE-2012-3073",
  "lastModified": "2024-11-21T01:40:11.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.303",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E2377D-690A-474E-843A-697DA2BDE7B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F55EB7-FF5A-418C-B7B2-F44C5920E266",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825."
    },
    {
      "lang": "es",
      "value": "Dispositivos TelePresence Recording Server con software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x y v1.6.x, no restrige correctamente el acceso remoto a la interfaz servlet de Java RMI, permitiendo a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de memoria y corte Web) a trav\u00e9s de m\u00faltiples peticiones manipuladas, tambi\u00e9n conocido como error ID CSCtg35830 y CSCtg35825."
    }
  ],
  "id": "CVE-2011-0388",
  "lastModified": "2024-11-21T01:23:51.907",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.900",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46523"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x, v1.6.x, y v1.7.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del proceso) a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como error ID CSCtj44534."
    }
  ],
  "id": "CVE-2011-0390",
  "lastModified": "2024-11-21T01:23:52.153",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:19.010",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x y v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del proceso) a trav\u00e9s de un paquete Real-Time Transport Control Protocol (RTCP) UDP manipulado, tambi\u00e9n conocido como error ID CSCth60993."
    }
  ],
  "id": "CVE-2011-0389",
  "lastModified": "2024-11-21T01:23:52.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.963",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-07-12 10:34
Modified
2024-11-21 01:39
Severity ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
Impacted products
Vendor Product Version
cisco telepresence_multipoint_switch_software *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.0.4.0\(21\)
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.0\(254\)
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.1\(30\)
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.1.2\(6\)
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.0\(222\)
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.1\(2\)
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.2\(21\)
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.3.12
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.4\(4\)
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.5\(1\)
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.5.6\(1\)
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.0\(108\)
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.1\(2\)
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.2\(3\)
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.3\(2\)
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch_software 1.6.4\(3\)
cisco telepresence_multipoint_switch_software 1.7.0
cisco telepresence_multipoint_switch_software 1.7.0.1\(5\)
cisco telepresence_multipoint_switch_software 1.7.1\(15\)
cisco telepresence_multipoint_switch_software 1.7.2\(75\)
cisco telepresence_multipoint_switch_software 1.7.3\(2\)
cisco telepresence_multipoint_switch_software 1.8.0
cisco telepresence_multipoint_switch_software 1.8.0\(1026\)
cisco telepresence_multipoint_switch_software 1.8.1\(1041\)
cisco telepresence_multipoint_switch_software 1.8.2
cisco telepresence_multipoint_switch_software 1.8.2\(2\)
cisco telepresence_multipoint_switch *
cisco telepresence_system_software *
cisco telepresence_system_software 1.2.3\(1101\)
cisco telepresence_system_software 1.3.2\(1393\)
cisco telepresence_system_software 1.4.7\(2229\)
cisco telepresence_system_software 1.5.1\(2082\)
cisco telepresence_system_software 1.5.3\(2115\)
cisco telepresence_system_software 1.5.10\(3648\)
cisco telepresence_system_software 1.5.11\(3659\)
cisco telepresence_system_software 1.5.12\(3701\)
cisco telepresence_system_software 1.5.13\(3717\)
cisco telepresence_system_software 1.6.0\(3954\)
cisco telepresence_system_software 1.6.2\(4023\)
cisco telepresence_system_software 1.6.3\(4042\)
cisco telepresence_system_software 1.6.4\(4072\)
cisco telepresence_system_software 1.6.5\(4097\)
cisco telepresence_system_software 1.6.6\(4109\)
cisco telepresence_system_software 1.6.7\(4212\)
cisco telepresence_system_software 1.6.8\(4222\)
cisco telepresence_system_software 1.7.0.1\(4764\)
cisco telepresence_system_software 1.7.0.2\(4719\)
cisco telepresence_system_software 1.7.1\(4864\)
cisco telepresence_system_software 1.7.2\(4937\)
cisco telepresence_system_software 1.7.2.1\(2\)
cisco telepresence_system_software 1.7.4\(270\)
cisco telepresence_system_software 1.7.5\(42\)
cisco telepresence_system_software 1.7.6\(4\)
cisco telepresence_system_software 1.8.0\(55\)
cisco telepresence_system_software 1.8.1\(34\)
cisco telepresence_system_software 1.8.2\(11\)
cisco telepresence_system_software 1.8.3\(4\)
cisco telepresence_system_software 1.9.0\(46\)
cisco telepresence_system_software 4.0.0
cisco telepresence_system_1300_65 *
cisco telepresence_system_3000 *
cisco telepresence_system_3010 *
cisco telepresence_system_3200 *
cisco telepresence_system_3210 *
cisco telepresence_system_t3 *
cisco telepresence_system_t3 *
cisco telepresence_system_tx1300_47 *
cisco telepresence_system_tx1310_65 *
cisco telepresence_system_tx9000 *
cisco telepresence_system_tx9200 *
cisco telepresence_manager *
cisco telepresence_manager 1.1.0.0
cisco telepresence_manager 1.1.0.0\(209\)
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.2.0.0\(200\)
cisco telepresence_manager 1.3.2\(466\)
cisco telepresence_manager 1.4.0\(279\)
cisco telepresence_manager 1.5.1\(420\)
cisco telepresence_manager 1.5.2\(423\)
cisco telepresence_manager 1.6.0\(220\)
cisco telepresence_manager 1.6.2\(64\)
cisco telepresence_manager 1.6.3\(113\)
cisco telepresence_manager 1.6.5\(167\)
cisco telepresence_manager 1.7.1\(732\)
cisco telepresence_manager 1.7.2\(256\)
cisco telepresence_manager 1.7.3.1
cisco telepresence_manager 1.7.4
cisco telepresence_manager 1.7.5\(62\)
cisco telepresence_manager 1.8.0\(582\)
cisco telepresence_recording_server *
cisco telepresence_recording_server 1.6.1\(2\)
cisco telepresence_recording_server 1.6.2\(31\)
cisco telepresence_recording_server 1.6.3\(4\)
cisco telepresence_recording_server 1.7.0\(190\)
cisco telepresence_recording_server 1.7.1\(22\)
cisco telepresence_recording_server 1.7.2.1
cisco telepresence_recording_server 1.7.3\(3\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABAC2DE-6574-4D78-B775-B3A478C0DE84",
              "versionEndIncluding": "1.8.3\\(9\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "83670AD7-A299-48FD-AF1A-261249AC3333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0\\(254\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2F01DA6A-CCAA-4560-A853-5113CF36E2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1\\(30\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A408D94F-1FEF-4E09-BCAA-C3376BE742CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7749883A-F17B-478C-8EDB-FEC1A327CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0\\(222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3A469A75-E05B-46DF-B015-1D6F66FCEDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB36FEE-3C6C-4154-BE60-6739EC32AFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2\\(21\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C13A0584-2967-4F6F-8C94-367AF9DF5ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B61CA1A-3A56-4734-9516-21109A8FDFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "599E9FA8-86A2-4051-80B4-7B851DA29B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0A7D1-8393-4485-ADC1-31095A0741B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "565B635E-6F48-4080-AA65-6D05A3502C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0\\(108\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD50E19-B3A3-4D56-9DF9-AC4636819E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4B850970-475F-40C9-851E-0D7817E370C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "047DAFF6-BB1D-4E32-AB96-788F932E6CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E85F955E-0D83-4A15-9EE6-0349E081F142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC32FCC-820D-4EDC-8DA6-2870FB1157A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB0E3F8-92FA-4DBF-94F0-21E8E568BC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.0.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF9EBA15-173E-4EFA-80D1-01481BC5055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.1\\(15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D23FE8B0-2FEF-44E2-A8D4-91F8C1425878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.2\\(75\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50B5EC0A-FF69-4CDF-B3EA-5503B1055699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.7.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B833CA-BC58-45A5-AA95-58251EAE16CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21C9A0A6-03FB-42EC-97E0-39BED09C88F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.0\\(1026\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "468F358D-D359-4D06-B6DF-A483BDFD69D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.1\\(1041\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E8937CE7-8C1E-40F6-A8E7-2E145E2CCEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "11AAD5AE-CC9E-42C9-AE82-F9AAF8D1A76B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D150A878-0913-4307-ABAA-5456DC20D6C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C0264-7890-4623-93EB-4D5218ED15C9",
              "versionEndIncluding": "1.9.0.1\\(3\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3\\(1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "12193063-0545-402F-87E6-61023184F5EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2\\(1393\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90D72D8E-0826-4716-A2EE-B934150EC5F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7\\(2229\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "494F0584-197E-4892-BD58-B574DBD090FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1\\(2082\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DEAF862B-43D6-42A2-B710-ED803906F251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3\\(2115\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA3E247-E67F-4237-AF71-FEB0528EC35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C68D879E-4522-4069-84B7-ED7C511B9D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11\\(3659\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3C97CD7F-1ED4-4F44-BC53-5CC3871915B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12\\(3701\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "45A3BE96-E4F8-4362-A18E-0EBCF4D65490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13\\(3717\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "679CFA7C-60D4-4369-905F-B52DCD321603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0\\(3954\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "90C4668B-CB7C-44EB-B352-DED7C252EAD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2\\(4023\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6BDB4EBF-C8A1-4CE6-B377-C09983BF3A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3\\(4042\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DAFA6C-2A25-499D-B11B-801F9031F2A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4\\(4072\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "456BF22C-3010-451F-853F-C46E94E954D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5\\(4097\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A64D44-EC08-4601-93AC-6C02A4412D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6\\(4109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "090FA16C-ABF2-4464-8219-D7A8917A7ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7\\(4212\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "774A9C95-8111-425B-A411-26F614384135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8\\(4222\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D1A003-6593-4934-8518-CC40F3F8ACE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.1\\(4764\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2B98FCCA-923C-4501-9B06-70CB3731F49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.0.2\\(4719\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29E0E9FC-EF3F-470A-93A4-CC9C7A71F6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.1\\(4864\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE77C52-E526-4B48-8EFA-5F5C59956308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2\\(4937\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BF620174-5C3E-43AF-8AEB-B9DD87F8C451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "315EDAEC-3C60-445A-9613-23D38E8C2873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.4\\(270\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "551E171E-973F-47A5-8A7F-70062E76E9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "43DB9A3E-F495-4D22-874F-DDFB73C07534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2177AF2B-BF5C-431C-8899-88ECC4E91BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DBBADC-6367-4F75-9F58-E42A05AC992C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEAB6C5-3B65-42D0-B597-0322D9F57C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD609D6C-0DA9-4D5F-B2F0-88BCAFCB7959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "62CBB917-651A-4EB8-842D-0BEA708A1BFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "34508470-64C3-4A99-BBB0-169AFA3BE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF71FA2-B8FC-4AE7-A0FD-8A4FAA0FE510",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AFF059-43A9-4419-92AB-D0EAFBE1511D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF6B03F-670A-4604-8B4F-1F05B146E36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC220DAD-E967-4CC5-9C13-6A5AE98D79EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13ACECA-121B-4D77-AB54-F579CF67098B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC98538-DDC7-4694-BF83-575D636D3817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_t3:*:*:custom:*:*:*:*:*",
              "matchCriteriaId": "E4E6005C-6268-4180-ABF7-0BEF945EEE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0CEC335-24DB-4C7E-B138-D566C95FB30E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCAAE92-6F2E-4F11-A240-D5EC67974424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "911B3EBA-5640-458A-B18A-FAC1309F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEB3C5-6C28-4D91-900E-98F0DC02478E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0525801E-2CC2-4206-AA70-7FE7512729E1",
              "versionEndIncluding": "1.8.1\\(682\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCFCAA7-1B5E-409D-8388-43B0EAC82624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.1.0.0\\(209\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2BF14D-8ADE-4656-A437-2E87E3EB7293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0\\(200\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "787488C6-8368-43EC-9A39-129B09A34C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2\\(466\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A2491CBE-8FEE-4507-BAAB-07017013C192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0\\(279\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "29C43D8A-884F-4DD6-AAF0-00735826C880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1\\(420\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6D057852-D8D8-4C14-A944-496147CBD981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2\\(423\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B86EE60D-1B0A-4C5C-B0ED-BE5D0A020839",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.0\\(220\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3D0011-FF6E-44CC-B9B4-EECF91F391D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2\\(64\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "50547D54-A287-489B-AA2F-36602746221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.3\\(113\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF42CDF-8499-440B-BB6A-A84D959CEBE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.5\\(167\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB057EA-8A16-41D4-A985-31A8AE82AB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.1\\(732\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4BBE4038-F575-4E01-8ABC-C5C004E0FF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.2\\(256\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "99EDB640-46B3-48E2-8574-71831BEE710B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1764E1-F1F8-4768-9BF6-E781FDEC756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4B9409-74CF-4859-9CA3-9C7D7AF19CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.7.5\\(62\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30BCAB-7A5D-48C8-AA76-DC70EA4AEBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.8.0\\(582\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5B26D12F-13FC-4E17-A636-68A68F4BA520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC1A60F-FA12-415C-A043-EE3494A99FBF",
              "versionEndIncluding": "1.8.0\\(160\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBF5E51-247F-4574-8A32-23DB07ED6E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.2\\(31\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8FCFA18B-3AE2-44F0-9C6F-4DE0839AA74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.6.3\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B175720C-9E5F-460D-9111-A22FBF035A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.0\\(190\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "21E362D5-C7AF-443C-B3D3-43D97F04E25F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.1\\(22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E599CC38-9431-4E7F-ADDF-524042C83DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D042A24-4621-4D8A-AFF5-219300ED4DC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server:1.7.3\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C04EA6-C8D5-42A0-8314-74734829FEBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n del protocolo Cisco Discovery Protocol (CDP)  en Cisco TelePresence Multipoint Switch anterior a v1.9.0, Cisco TelePresence Immersive Endpoint Devices anterior a v1.9.1, Cisco TelePresence Manager anterior a v1.9.0, y Cisco TelePresence Recording Server anterior a v1.8.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante el env\u00edo de paquetes CDP mal formados, tambi\u00e9n conocido como Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, y  CSCtz40953."
    }
  ],
  "id": "CVE-2012-2486",
  "lastModified": "2024-11-21T01:39:08.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-12T10:34:42.257",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025111
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025112
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025113
ykramarz@cisco.comhttp://www.securitytracker.com/id?1025114
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025111
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025112
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025113
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025114
Impacted products
Vendor Product Version
cisco adaptive_security_appliance_software 1.6.0
cisco 5500_series_adaptive_security_appliance *
cisco asa_5500 *
cisco telepresence_multipoint_switch_software 1.0.4.0
cisco telepresence_multipoint_switch_software 1.1.0
cisco telepresence_multipoint_switch_software 1.1.1
cisco telepresence_multipoint_switch_software 1.1.2
cisco telepresence_multipoint_switch_software 1.5.0
cisco telepresence_multipoint_switch_software 1.5.1
cisco telepresence_multipoint_switch_software 1.5.2
cisco telepresence_multipoint_switch_software 1.5.3
cisco telepresence_multipoint_switch_software 1.5.4
cisco telepresence_multipoint_switch_software 1.5.5
cisco telepresence_multipoint_switch_software 1.5.6
cisco telepresence_multipoint_switch_software 1.6.0
cisco telepresence_multipoint_switch_software 1.6.1
cisco telepresence_multipoint_switch_software 1.6.2
cisco telepresence_multipoint_switch_software 1.6.3
cisco telepresence_multipoint_switch_software 1.6.4
cisco telepresence_multipoint_switch *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1000 *
cisco telepresence_system_1100 *
cisco telepresence_system_software 1.2.3
cisco telepresence_system_software 1.3.2
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3000 *
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_1300_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_3200_series *
cisco telepresence_system_software 1.4.7
cisco telepresence_system_software 1.5.1
cisco telepresence_system_software 1.5.3
cisco telepresence_system_software 1.5.10
cisco telepresence_system_software 1.5.11
cisco telepresence_system_software 1.5.12
cisco telepresence_system_software 1.5.13
cisco telepresence_system_software 1.6.0
cisco telepresence_system_software 1.6.2
cisco telepresence_system_software 1.6.3
cisco telepresence_system_software 1.6.4
cisco telepresence_system_software 1.6.5
cisco telepresence_system_software 1.6.6
cisco telepresence_system_software 1.6.7
cisco telepresence_system_software 1.6.8
cisco telepresence_system_500_series *
cisco telepresence_manager 1.2.0.0
cisco telepresence_manager 1.3.2
cisco telepresence_manager 1.4.0
cisco telepresence_manager 1.5.1
cisco telepresence_manager 1.5.2
cisco telepresence_manager 1.6.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint  con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos  ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761."
    }
  ],
  "id": "CVE-2011-0379",
  "lastModified": "2024-11-21T01:23:50.823",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.383",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164."
    },
    {
      "lang": "es",
      "value": "La interfaz web de administraci\u00f3n de dispositivos Cisco TelePresence Multipoint Switch (CTMS) con el software v1.0.x, v1.1.x, v1.5.x, y v1.6.x, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio o tener un impacto no especificado a trav\u00e9s de vectores que implican el acceso a un servlet, tambi\u00e9n conocido como error ID CSCtf97164."
    }
  ],
  "id": "CVE-2011-0387",
  "lastModified": "2024-11-21T01:23:51.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 8.5,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.837",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F357829D-FEBE-498A-AD14-680411A7C522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E2377D-690A-474E-843A-697DA2BDE7B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "61F55EB7-FF5A-418C-B7B2-F44C5920E266",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73576525-5C00-4D19-8670-F4D8B841A57B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065."
    },
    {
      "lang": "es",
      "value": "La interfaz web de administraci\u00f3n de dispositivos Cisco TelePresence Recording Server con el software v1.6.x y Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x permite a atacantes remotos crear o sobreescribir archivos arbitrarios, y posiblemente ejecutar c\u00f3digo arbitrario, a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como error ID CSCth85786 y CSCth61065."
    }
  ],
  "id": "CVE-2011-0385",
  "lastModified": "2024-11-21T01:23:51.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.727",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253."
    },
    {
      "lang": "es",
      "value": "El  Java Servlet framework en dispositivos Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x no requiere autenticaci\u00f3n administrativa para acciones no especificadas, permitiendo a  atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n manipulada, tambi\u00e9n conocido como error ID CSCtf01253."
    }
  ],
  "id": "CVE-2011-0384",
  "lastModified": "2024-11-21T01:23:51.413",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:18.680",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2012-3073
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-16 16:52
Severity ?
Summary
The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-3073",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IP implementation on Cisco TelePresence Multipoint Switch before 1.8.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server 1.8 and earlier allows remote attackers to cause a denial of service (networking outage or process crash) via (1) malformed IP packets, (2) a high rate of TCP connection requests, or (3) a high rate of TCP connection terminations, aka Bug IDs CSCti21830, CSCti21851, CSCtj19100, CSCtj19086, CSCtj19078, CSCty11219, CSCty11299, CSCty11323, and CSCty11338."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-3073",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-30T00:00:00Z",
    "dateUpdated": "2024-09-16T16:52:38.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0385
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.918Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "telepresence-interface-file-upload(65604)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "telepresence-interface-file-upload(65604)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0385",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "telepresence-interface-file-upload(65604)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65604"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0385",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0389
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-multipoint-rtpc-dos(65622)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622"
          },
          {
            "name": "46520",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46520"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-multipoint-rtpc-dos(65622)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622"
        },
        {
          "name": "46520",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46520"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0389",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-multipoint-rtpc-dos(65622)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65622"
            },
            {
              "name": "46520",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46520"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0389",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0384
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.923Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46520",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46520"
          },
          {
            "name": "cisco-switch-java-unauth-access(65620)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "46520",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46520"
        },
        {
          "name": "cisco-switch-java-unauth-access(65620)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0384",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46520",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46520"
            },
            {
              "name": "cisco-switch-java-unauth-access(65620)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65620"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0384",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.923Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0390
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.066Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46520",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46520"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "telepresence-multipoint-xmlrpc-dos(65623)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "46520",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46520"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "telepresence-multipoint-xmlrpc-dos(65623)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0390",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46520",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46520"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "telepresence-multipoint-xmlrpc-dos(65623)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65623"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0390",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.066Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0387
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-multipoint-interface-dos(65621)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621"
          },
          {
            "name": "46520",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46520"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-multipoint-interface-dos(65621)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621"
        },
        {
          "name": "46520",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46520"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0387",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-multipoint-interface-dos(65621)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65621"
            },
            {
              "name": "46520",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46520"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0387",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0388
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.555Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "46523",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46523"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-11T10:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "46523",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46523"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "46523",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46523"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0388",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.555Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0383
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.928Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46519",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46519"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "telepresence-java-unauth-access(65602)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "46519",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46519"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "telepresence-java-unauth-access(65602)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0383",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46519",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46519"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "telepresence-java-unauth-access(65602)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65602"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0383",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0379
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025111",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025111"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
          },
          {
            "name": "1025114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025114"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
          },
          {
            "name": "1025112",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025112"
          },
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
          },
          {
            "name": "1025113",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025113"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-03-18T09:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1025111",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025111"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
        },
        {
          "name": "1025114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025114"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
        },
        {
          "name": "1025112",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025112"
        },
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
        },
        {
          "name": "1025113",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025113"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2011-0379",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025111",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025111"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml"
            },
            {
              "name": "1025114",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025114"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml"
            },
            {
              "name": "1025112",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025112"
            },
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"
            },
            {
              "name": "1025113",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025113"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0379",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.057Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-2486
Vulnerability from cvelistv5
Published
2012-07-12 10:00
Modified
2024-09-17 04:25
Severity ?
Summary
The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:34:25.760Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
          },
          {
            "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-12T10:00:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
        },
        {
          "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-2486",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
            },
            {
              "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-2486",
    "datePublished": "2012-07-12T10:00:00Z",
    "dateReserved": "2012-05-07T00:00:00Z",
    "dateUpdated": "2024-09-17T04:25:44.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}