All the vulnerabilites related to cisco - telepresence_system_1300_series
cve-2011-0379
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025111 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025114 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id?1025113 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025111", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-18T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025111", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025111", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025111" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Manager", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "name": "1025114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025114" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "name": "1025113", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025113" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0379", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0372
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0372", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0372", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0377
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65616 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-endpoint-ipaddress-dos(65616)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-endpoint-ipaddress-dos(65616)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" }, { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-endpoint-ipaddress-dos(65616)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" }, { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0377", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0375
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0375", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0374
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0374", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0374", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0376
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0376", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0378
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0378", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:08.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0373
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1025112 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-03-31T09:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1025112", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0373", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1025112", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025112" }, { "name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0373", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEB918FB-1194-43C0-BAAC-3876B59164B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD084A4-0AA0-499F-9D2F-9AD0FC87B0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B862A01F-71E8-412F-AF83-3A64FB7352EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "909CA78F-933F-4C79-8F91-D6B17FCD7093", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C885CA7-3DCC-4C05-8945-FBF2CD08EACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D000335-5F60-49A8-B642-A5BEDC6A6820", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBBD9AB4-AC7C-4D3D-AF93-1B9D8AAF31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8EF29-8A24-47C7-8108-07B27AF0FDC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D99CDCC2-5373-447E-9AB2-DEDB5C6327D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "669BF6F3-CE41-43F2-BB6D-E594EB7CFCC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "606E06B8-B00B-4EE1-A763-A62C9105C5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "CECA0482-FD41-46E7-A8F9-54BC665A83FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E431D427-EA04-4296-BB23-D638ADA1FF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70A01B1-CE17-47BF-9035-7168DF790125", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0A9D905-3740-4B9D-A26C-DFA6CBD2D154", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "69F84CF3-ED9D-4962-8930-ACB5319AFF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "260AD1B1-D5F3-433D-8B82-DF17197031C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BECB-61EE-4668-B139-D46BCF5E0F69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "958731AE-088F-4A27-9748-8F4E6B21222C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "680CC0AB-9967-4E7D-9EA5-47B0FA1DB522", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5220D887-FC9F-4286-AEFF-2ACD74EE6A30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F5A0DF6-904A-415F-BA3C-10B290017F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "19771971-2399-40AB-9823-A369E528FAF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_manager:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "16A587E8-0C8C-4A76-BB33-AECF726FED79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en dispositivos Cisco Adaptive Security Appliances (ASA) 5500 con el software v1.6.x; Cisco TelePresence Multipoint Switch (CTMS) con software v1.0.x, v1.1.x, v1.5.x, y v1.6.x; Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x; y Cisco TelePresence Manager v1.2.x, v1.3.x, v1.4.x, v1.5.x, y v1.6.2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un paquete Cisco Discovery Protocol, tambi\u00e9n conocido como error IDs CSCtd75769, CSCtd75766, CSCtd75754, y CSCtd75761." } ], "id": "CVE-2011-0379", "lastModified": "2024-11-21T01:23:50.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.383", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025111" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025114" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FBF8BE7-C77D-4259-9AC7-FF8987AFCD60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876." }, { "lang": "es", "value": "La implementaci\u00f3n TFTP en los dispositivos de Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x, v1.6.0 y v1.6.1 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una petici\u00f3n GET, tambi\u00e9n conocido como error ID CSCte43876." } ], "id": "CVE-2011-0376", "lastModified": "2024-11-21T01:23:50.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.167", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCth24671." }, { "lang": "es", "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.6.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCth24671." } ], "id": "CVE-2011-0375", "lastModified": "2024-11-21T01:23:50.127", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.087", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31640." }, { "lang": "es", "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidades de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31640." } ], "id": "CVE-2011-0372", "lastModified": "2024-11-21T01:23:49.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:01.557", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6456B65-FE0C-4133-BADD-2B3872855348", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F71BC-9BFB-4CD5-A742-59128D92416F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E31F77A6-9FF8-4B23-B6B6-6AC349F09188", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "30601D29-8C6A-463D-9DFC-4C3384943605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "81650747-4FA7-4EBA-8DB5-DF267FC0429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "20179515-AFBB-4A21-B6FE-F9E7201ECC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A972EC60-951B-496C-963B-9A073B587659", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "DB269620-5DE5-4D07-8D80-45A52C71E3D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605." }, { "lang": "es", "value": "Dispositivos Cisco TelePresence endopint con software v1.2.x hasta v1.6.x permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del servicio) a trav\u00e9s de una solicitud SOAP malformada en combinaci\u00f3n con un TelePresence Manager falsificado que proporciona una direcci\u00f3n IP no v\u00e1lida, tambi\u00e9n conocido como error ID CSCth03605." } ], "id": "CVE-2011-0377", "lastModified": "2024-11-21T01:23:50.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.243", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31685." }, { "lang": "es", "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31685." } ], "id": "CVE-2011-0373", "lastModified": "2024-11-21T01:23:49.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:17.633", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a \"command injection vulnerability,\" aka Bug ID CSCtb52587." }, { "lang": "es", "value": "La implementaci\u00f3n XML-RPC en dispositivos Cisco TelePresence endpoint con software v1.2.x hasta v1.5.x permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n TCP, relacionado con una \"vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb52587." } ], "id": "CVE-2011-0378", "lastModified": "2024-11-21T01:23:50.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:18.307", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "9397D7AF-428C-422C-8EB1-B7C59D567BB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:telepresence_system_1100:*:*:*:*:*:*:*:*", "matchCriteriaId": "505B044D-2529-4605-9FD0-C6B8B534B4C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5EAB196-F648-42F7-9621-9D43FA9288C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFE7BB6D-16FF-4141-93A1-1B4EB7C1D46C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC14CB1A-DE5C-4877-8FFB-DF2FA1ADE176", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_1300_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D3C3AC-464F-4BCB-B3FF-CE4718156109", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_3200_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9CB2EA2-9BC8-4FFD-B79C-0887D65B082B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "31487AA7-257C-4216-B5E5-6244FF06D00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4062C260-C7B5-40E4-B77E-5AC1BFDB303D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF632-4F67-4D04-A7D9-FDDF24E22541", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "27ECF70E-A6FE-4277-B02A-F0551271446B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "68CC9A38-CA82-4558-BC92-0433301570E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "F74C1145-E2DC-41A5-ADD8-282332124C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:telepresence_system_software:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "B1CB7370-5367-4C3E-9B0E-88A29E1E8704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_system_500_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04D64C3-9105-49CD-8CED-E802E348ECF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to \"command injection vulnerabilities,\" aka Bug ID CSCtb31659." }, { "lang": "es", "value": "La implementaci\u00f3n CGI en dispositivos Cisco TelePresence con software v1.2.x hasta v1.5.x permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud malformada, relacionado con la \" vulnerabilidad de inyecci\u00f3n de comandos\", tambi\u00e9n conocido como error ID CSCtb31659." } ], "id": "CVE-2011-0374", "lastModified": "2024-11-21T01:23:49.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:17.727", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025112" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }