cve-2015-0616
Vulnerability from cvelistv5
Published
2015-04-03 18:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150401 Multiple Vulnerabilities in Cisco Unity Connection", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc" }, { "name": "1032010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032010" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-08T17:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150401 Multiple Vulnerabilities in Cisco Unity Connection", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc" }, { "name": "1032010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032010" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0616", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150401 Multiple Vulnerabilities in Cisco Unity Connection", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc" }, { "name": "1032010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032010" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0616", "datePublished": "2015-04-03T18:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"101FCDD0-DC91-4111-975E-DE618D3B4E9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D386D8CD-D6EA-4705-ABDC-EA6558F5AC30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4B1917B-197C-4E28-9356-2ACC4C4DB932\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5567A000-338E-40D7-9481-674B8FFC142D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA991A88-D49E-4957-B404-6E3C15C96994\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BECA1F06-6FFD-4A0D-B140-B25E39FB8513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2ADCE50E-87C1-49D7-B127-92174327EAB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D11810A-80D7-41BB-B370-30218FF52F17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C547C041-6C58-44D5-93D7-C02E04E93994\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C40F61A6-A992-4DA4-9730-D145055596C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78970987-BD6E-48A0-AF43-540C925E1F97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"632B8CDD-5ACC-4FFB-950B-480CC43D192D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7740A5EF-538E-4095-91F5-E4DC03EDB35B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D805DD4A-269D-4399-B6BF-7F40F98C3BE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A06A53BA-668B-41C0-B223-6637487EF113\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82B3ABB4-A33A-4886-9871-C24B33B3AEE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:9.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6793E1F6-DC57-4A13-B49D-0ED45E48426C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:9.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50CD06E4-0C09-4DD7-B106-56DC680CE333\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unity_connection:9.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA2751A8-A3CF-4CC7-A7F2-003165C1AEDB\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819.\"}, {\"lang\": \"es\", \"value\": \"El proceso Connection Conversation Manager (tambi\\u00e9n conocido como CuCsMgr) en Cisco Unity Connection 8.5 anterior a 8.5(1)SU7, 8.6 anterior a 8.6(2a)SU4, y 9.x anterior a 9.1(2)SU2, cuando la integraci\\u00f3n de SIP \u0027trunk\u0027 est\\u00e1 habilitada, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (volcado de n\\u00facleo y reinicio) mediante la terminaci\\u00f3n incorrecta de las conexiones TCP del protocolo de inicio de sesi\\u00f3n (SIP), tambi\\u00e9n conocido como Bug ID CSCul69819.\"}]", "id": "CVE-2015-0616", "lastModified": "2024-11-21T02:23:25.030", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2015-04-03T18:59:04.757", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1032010\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1032010\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-19\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2015-0616\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2015-04-03T18:59:04.757\",\"lastModified\":\"2024-11-21T02:23:25.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819.\"},{\"lang\":\"es\",\"value\":\"El proceso Connection Conversation Manager (tambi\u00e9n conocido como CuCsMgr) en Cisco Unity Connection 8.5 anterior a 8.5(1)SU7, 8.6 anterior a 8.6(2a)SU4, y 9.x anterior a 9.1(2)SU2, cuando la integraci\u00f3n de SIP \u0027trunk\u0027 est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (volcado de n\u00facleo y reinicio) mediante la terminaci\u00f3n incorrecta de las conexiones TCP del protocolo de inicio de sesi\u00f3n (SIP), tambi\u00e9n conocido como Bug ID CSCul69819.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"101FCDD0-DC91-4111-975E-DE618D3B4E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D386D8CD-D6EA-4705-ABDC-EA6558F5AC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1917B-197C-4E28-9356-2ACC4C4DB932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5567A000-338E-40D7-9481-674B8FFC142D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA991A88-D49E-4957-B404-6E3C15C96994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECA1F06-6FFD-4A0D-B140-B25E39FB8513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADCE50E-87C1-49D7-B127-92174327EAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D11810A-80D7-41BB-B370-30218FF52F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C547C041-6C58-44D5-93D7-C02E04E93994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C40F61A6-A992-4DA4-9730-D145055596C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78970987-BD6E-48A0-AF43-540C925E1F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"632B8CDD-5ACC-4FFB-950B-480CC43D192D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7740A5EF-538E-4095-91F5-E4DC03EDB35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D805DD4A-269D-4399-B6BF-7F40F98C3BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06A53BA-668B-41C0-B223-6637487EF113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B3ABB4-A33A-4886-9871-C24B33B3AEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6793E1F6-DC57-4A13-B49D-0ED45E48426C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CD06E4-0C09-4DD7-B106-56DC680CE333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2751A8-A3CF-4CC7-A7F2-003165C1AEDB\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032010\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.