All the vulnerabilites related to cisco - telepresence_server_mse_8710
Vulnerability from fkie_nvd
Published
2016-04-06 23:59
Modified
2024-11-21 02:34
Severity ?
Summary
Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_powerscale_onefs:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF89B320-6D5A-4E46-A1FA-FCDB31F325C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF", "versionEndExcluding": "2017-01-06", "vulnerable": true }, { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true }, { "criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*", "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "983E3CC5-7B3A-467A-A482-0D19792CB55E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*", "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_310:-:*:*:*:*:*:*:*", "matchCriteriaId": "51463F95-8A40-47CC-A0FD-B8F0ED16C39F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7792A73D-C38F-44E6-A660-6CDB0955EC69", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_virtual_machine:-:*:*:*:*:*:*:*", "matchCriteriaId": "18C16ABE-9BA2-4852-9B12-70BA6A1D50C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348." }, { "lang": "es", "value": "Cisco TelePresence Server 3.1 sobre dispositivos 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 y 320 y Virtual Machine (VM) permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes STUN mal formados, tambi\u00e9n conocido como Bug ID CSCuv01348." } ], "id": "CVE-2015-6312", "lastModified": "2024-11-21T02:34:45.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-06T23:59:00.113", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1035500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035500" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-20 14:59
Modified
2024-11-21 02:34
Severity ?
Summary
Buffer overflow in the Conference Control Protocol API implementation in Cisco TelePresence Server software before 4.1(2.33) on 7010, MSE 8710, Multiparty Media 310 and 320, and Virtual Machine devices allows remote attackers to cause a denial of service (device crash) via a crafted URL, aka Bug ID CSCuu28277.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps | Vendor Advisory | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1033580 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033580 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | telepresence_server_software | 2.3\(1.55\) | |
cisco | telepresence_server_software | 2.3\(1.57\) | |
cisco | telepresence_server_software | 3.0\(2.24\) | |
cisco | telepresence_server_software | 3.0\(2.46\) | |
cisco | telepresence_server_software | 3.0\(2.48\) | |
cisco | telepresence_server_software | 3.0\(2.49\) | |
cisco | telepresence_server_software | 3.1\(1.80\) | |
cisco | telepresence_server_software | 3.1\(1.82\) | |
cisco | telepresence_server_software | 3.1\(1.95\) | |
cisco | telepresence_server_software | 3.1\(1.96\) | |
cisco | telepresence_server_software | 3.1\(1.97\) | |
cisco | telepresence_server_software | 3.1\(1.98\) | |
cisco | telepresence_server_software | 4.0\(1.57\) | |
cisco | telepresence_server_software | 4.0\(2.8\) | |
cisco | telepresence_server_software | 4.1\(1.79\) | |
cisco | telepresence_server_7010 | - | |
cisco | telepresence_server_mse_8710 | - | |
cisco | telepresence_server_on_multiparty_media_310 | - | |
cisco | telepresence_server_on_multiparty_media_320 | - | |
cisco | telepresence_server_on_virtual_machine | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.3\\(1.55\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C8E87AF-FAC5-419F-80DF-02EF48485990", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.3\\(1.57\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A5488C8-1B72-41D5-B346-1C27B529BAC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.0\\(2.24\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE67D1A0-522A-4FEB-A59E-27D8E8FA3196", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.0\\(2.46\\):*:*:*:*:*:*:*", "matchCriteriaId": "A4A68418-34B5-4ACE-8F5C-B0609E8A76B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.0\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "C34CF67C-94F7-4252-99CA-468AC3E6F735", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.0\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "288C4183-2BB1-4BEE-B99D-419D6948087E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.80\\):*:*:*:*:*:*:*", "matchCriteriaId": "EBDD6C7C-F04F-4637-A582-A2A3C7FDB124", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.82\\):*:*:*:*:*:*:*", "matchCriteriaId": "D520D173-93B8-4991-A632-C8EBE880F4EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.95\\):*:*:*:*:*:*:*", "matchCriteriaId": "04C63DDA-0E39-4F7D-86ED-50166D13A575", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.96\\):*:*:*:*:*:*:*", "matchCriteriaId": "928F0A7E-A758-4030-802B-66761FF7EA1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.97\\):*:*:*:*:*:*:*", "matchCriteriaId": "53B053D6-71BF-46D7-97A7-54946FFA690A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:3.1\\(1.98\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D515279-816E-43A1-8A8F-364F5DE5B919", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:4.0\\(1.57\\):*:*:*:*:*:*:*", "matchCriteriaId": "71B3BA0E-F4D1-484D-987D-F96DD3DECDB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:4.0\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "28A70BA8-B132-4EAC-A9C5-706B5BE7D837", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:4.1\\(1.79\\):*:*:*:*:*:*:*", "matchCriteriaId": "409C5B7B-4A9B-40CE-97CA-4899FB075CC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "983E3CC5-7B3A-467A-A482-0D19792CB55E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*", "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_310:-:*:*:*:*:*:*:*", "matchCriteriaId": "51463F95-8A40-47CC-A0FD-B8F0ED16C39F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7792A73D-C38F-44E6-A660-6CDB0955EC69", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_virtual_machine:-:*:*:*:*:*:*:*", "matchCriteriaId": "18C16ABE-9BA2-4852-9B12-70BA6A1D50C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Conference Control Protocol API implementation in Cisco TelePresence Server software before 4.1(2.33) on 7010, MSE 8710, Multiparty Media 310 and 320, and Virtual Machine devices allows remote attackers to cause a denial of service (device crash) via a crafted URL, aka Bug ID CSCuu28277." }, { "lang": "es", "value": "Desbordamiento de buffer en la implementaci\u00f3n de la API del Conference Control Protocol en el software de Cisco TelePresence Server en versiones anteriores a 4.1(2.33) en 7010, MSE 8710, Multiparty Media 310 y 320 y dispositivos Virtual Machine, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del dispositivo) a trav\u00e9s de una URL manipulada, tambi\u00e9n conocida como Bug ID CSCuu28277." } ], "id": "CVE-2015-6284", "lastModified": "2024-11-21T02:34:42.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-20T14:59:02.367", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033580" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-18 18:55
Modified
2024-11-21 01:49
Severity ?
Summary
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E8F4FBB-E964-4321-AB35-E16ABA3F5034", "versionEndIncluding": "4.3\\(2.18\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*", "matchCriteriaId": "795D8FB0-600A-4EF1-B97E-55B526AA5505", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*", "matchCriteriaId": "FFEEEBC8-9B0D-4B17-827A-FBEA7643AB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*", "matchCriteriaId": "124EDEE8-9515-4178-AFC0-B1F2FA34388A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB48A28E-4BBD-477B-A96B-B99879198583", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*", "matchCriteriaId": "2C0C6D91-2585-4531-AA86-1DBDE85F6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D00A572-D5EC-4186-809B-4C66E9147F91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4505:-:*:*:*:*:*:*:*", "matchCriteriaId": "5574D81E-25A1-477A-978C-109D667771A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4510:-:*:*:*:*:*:*:*", "matchCriteriaId": "96560014-147A-4AE1-A215-E2F04B3AD7C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4515:-:*:*:*:*:*:*:*", "matchCriteriaId": "72129DF6-D50B-46D8-84EA-95E65D86FF62", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4520:-:*:*:*:*:*:*:*", "matchCriteriaId": "11C64580-60FB-40CB-968A-1737E59A1E6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "57751069-E382-4004-8B76-5296243F43A7", "versionEndIncluding": "4.3\\(2.18\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*", "matchCriteriaId": "A667D636-560E-4CED-864E-B23AEC62C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*", "matchCriteriaId": "F3A8B1D8-1CF0-4B3B-A9C9-581199F24588", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E57DAE9-4E29-4585-AEE5-B4806A9429AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*", "matchCriteriaId": "053A2E65-8427-43DE-B126-744EDCE7767A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BEE259-94FF-4C6C-8881-D39B44C241CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*", "matchCriteriaId": "41C17A23-E669-4D11-AC8F-ACBBC7D94A0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_4501:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B739B1A-89D5-48EF-829E-E52AF298D840", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55AE599-11DB-4688-A384-D11CC31247A1", "versionEndIncluding": "4.3\\(2.18\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*", "matchCriteriaId": "3494A9FA-2470-4A8D-A2ED-40A8711961F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*", "matchCriteriaId": "BC10B558-661C-4AB8-97C8-7CE6FDBD6262", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*", "matchCriteriaId": "5112E0B4-690D-4159-A1A8-7078FACF25BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*", "matchCriteriaId": "CADE4238-16ED-4D5C-AD8A-EFB63511E034", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*", "matchCriteriaId": "C33BCB3F-9C7F-478A-BC9B-BD6935FF2E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*", "matchCriteriaId": "1BC9217A-F120-4811-B854-3DDA58E27FF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_mcu_mse_8510:-:*:*:*:*:*:*:*", "matchCriteriaId": "738ED7C7-98D6-4BD5-9115-48405F350CC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "77E008F3-B240-4699-A7E2-6E3BD1C87812", "versionEndIncluding": "2.2\\(1.54\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.33\\):*:*:*:*:*:*:*", "matchCriteriaId": "4987F125-01CF-4D17-AF4C-E1F4BB977039", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.37\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB6EAFBB-5B0A-43E0-A7A7-8B2C17033301", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_server_software:2.2\\(1.43\\):*:*:*:*:*:*:*", "matchCriteriaId": "B029054E-5575-40DA-B9C0-C45A0E938D8E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "983E3CC5-7B3A-467A-A482-0D19792CB55E", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*", "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448." }, { "lang": "es", "value": "La tarjeta DSP de los dispositivos Cisco TelePresence MCU 4500 y 4501 antes de v4.3(2.30), dispositivos TelePresence MCU MSE 8510 dispositivos antes de v4.3(2.30), y TelePresence Server antes de v2.3(1.55) no valida correctamente los datos de H.264, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga dispositivo) a trav\u00e9s de paquetes hechos a RTP en una (1) sesi\u00f3n de SIP o (2) la sesi\u00f3n H.323, tambi\u00e9n conocido como Bug ID CSCuc11328 y CSCub05448." } ], "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi\r\n\r\n\u0027Vulnerable Products\r\nThe following Cisco TelePresence Infrastructure products are affected by this vulnerability:\r\n\r\n Cisco TelePresence MCU 4501 Series, MCU 4500 Series and Cisco TelePresence MCU MSE 8510 versions 4.3(2.18) and earlier\r\n Cisco TelePresence Server versions 2.2(1.54) and earlier\u0027\r\n", "id": "CVE-2013-1176", "lastModified": "2024-11-21T01:49:03.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-18T18:55:03.970", "references": [ { "source": "ykramarz@cisco.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-06 23:59
Modified
2024-11-21 02:34
Severity ?
Summary
Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true }, { "criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*", "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "983E3CC5-7B3A-467A-A482-0D19792CB55E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*", "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_310:-:*:*:*:*:*:*:*", "matchCriteriaId": "51463F95-8A40-47CC-A0FD-B8F0ED16C39F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7792A73D-C38F-44E6-A660-6CDB0955EC69", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_multiparty_media_820:-:*:*:*:*:*:*:*", "matchCriteriaId": "242B17EF-773A-4629-80AC-D3B4E476B56F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:telepresence_server_on_virtual_machine:-:*:*:*:*:*:*:*", "matchCriteriaId": "18C16ABE-9BA2-4852-9B12-70BA6A1D50C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565." }, { "lang": "es", "value": "Cisco TelePresence Server 4.1(2.29) hasta la versi\u00f3n 4.2(4.17) sobre dispositivos 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320 y 820; y Virtual Machine (VM) permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria o recarga de dispositivo) a trav\u00e9s de peticiones HTTP que no van seguidas de una negociaci\u00f3n no especificada, tambi\u00e9n conocido como Bug ID CSCuv47565." } ], "id": "CVE-2015-6313", "lastModified": "2024-11-21T02:34:45.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-06T23:59:01.283", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1035501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035501" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-06 23:59
Modified
2024-11-21 02:46
Severity ?
Summary
The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | emc_powerscale_onefs | 8.2.2 | |
netgear | jr6150_firmware | * | |
samsung | x14j_firmware | t-ms14jakucb-1102.5 | |
zyxel | gs1900-10hp_firmware | * | |
zzinc | keymouse_firmware | 3.08 | |
cisco | telepresence_server_mse_8710 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:emc_powerscale_onefs:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF89B320-6D5A-4E46-A1FA-FCDB31F325C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF", "versionEndExcluding": "2017-01-06", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true }, { "criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*", "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*", "matchCriteriaId": "411829A8-56C6-4851-8063-97F03C7B66B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673." }, { "lang": "es", "value": "El kernel en Cisco TelePresence Server 3.0 hasta la versi\u00f3n 4.2(4.18) en dispositivos Mobility Services Engine (MSE) 8710 permite a atacantes remotos causar una denegaci\u00f3n de servicio (p\u00e1nico y reinicio) a trav\u00e9s de una secuencia de paquetes IPv6 manipulada, tambi\u00e9n conocido como Bug ID CSCuu46673." } ], "id": "CVE-2016-1346", "lastModified": "2024-11-21T02:46:13.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-06T23:59:13.740", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1035499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035499" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2016-1346
Vulnerability from cvelistv5
Published
2016-04-06 23:00
Modified
2024-08-05 22:55
Severity ?
EPSS score ?
Summary
The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1035499 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:55:14.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160406 Cisco TelePresence Server Crafted IPv6 Packet Handling Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts" }, { "name": "1035499", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035499" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20160406 Cisco TelePresence Server Crafted IPv6 Packet Handling Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts" }, { "name": "1035499", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035499" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-1346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160406 Cisco TelePresence Server Crafted IPv6 Packet Handling Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts" }, { "name": "1035499", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035499" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-1346", "datePublished": "2016-04-06T23:00:00", "dateReserved": "2016-01-04T00:00:00", "dateUpdated": "2024-08-05T22:55:14.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6284
Vulnerability from cvelistv5
Published
2015-09-20 14:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
Buffer overflow in the Conference Control Protocol API implementation in Cisco TelePresence Server software before 4.1(2.33) on 7010, MSE 8710, Multiparty Media 310 and 320, and Virtual Machine devices allows remote attackers to cause a denial of service (device crash) via a crafted URL, aka Bug ID CSCuu28277.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1033580 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:15:13.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033580", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033580" }, { "name": "20150916 Cisco TelePresence Server Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Conference Control Protocol API implementation in Cisco TelePresence Server software before 4.1(2.33) on 7010, MSE 8710, Multiparty Media 310 and 320, and Virtual Machine devices allows remote attackers to cause a denial of service (device crash) via a crafted URL, aka Bug ID CSCuu28277." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1033580", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033580" }, { "name": "20150916 Cisco TelePresence Server Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Conference Control Protocol API implementation in Cisco TelePresence Server software before 4.1(2.33) on 7010, MSE 8710, Multiparty Media 310 and 320, and Virtual Machine devices allows remote attackers to cause a denial of service (device crash) via a crafted URL, aka Bug ID CSCuu28277." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033580", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033580" }, { "name": "20150916 Cisco TelePresence Server Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150916-tps" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6284", "datePublished": "2015-09-20T14:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:15:13.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1176
Vulnerability from cvelistv5
Published
2013-04-18 18:00
Modified
2024-09-16 19:52
Severity ?
EPSS score ?
Summary
The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-18T18:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-1176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130417 Cisco TelePresence Infrastructure Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-1176", "datePublished": "2013-04-18T18:00:00Z", "dateReserved": "2013-01-11T00:00:00Z", "dateUpdated": "2024-09-16T19:52:01.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6312
Vulnerability from cvelistv5
Published
2016-04-06 23:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2 | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1035500 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:15:13.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160406 Cisco TelePresence Server Malformed STUN Packet Processing Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2" }, { "name": "1035500", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035500" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20160406 Cisco TelePresence Server Malformed STUN Packet Processing Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2" }, { "name": "1035500", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035500" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160406 Cisco TelePresence Server Malformed STUN Packet Processing Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2" }, { "name": "1035500", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035500" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6312", "datePublished": "2016-04-06T23:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:15:13.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6313
Vulnerability from cvelistv5
Published
2016-04-06 23:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1035501 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1 | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:15:13.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035501", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035501" }, { "name": "20160406 Cisco TelePresence Server Crafted URL Handling Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1035501", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035501" }, { "name": "20160406 Cisco TelePresence Server Crafted URL Handling Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6313", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035501", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035501" }, { "name": "20160406 Cisco TelePresence Server Crafted URL Handling Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6313", "datePublished": "2016-04-06T23:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:15:13.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }