VAR-201304-0287
Vulnerability from variot - Updated: 2023-12-18 12:45The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called "Telepresence" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a "face-to-face" virtual conference room effect. A denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201304-0287",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.2\\(1.46\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.1\\(1.51\\)"
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.1\\(1.59\\)"
},
{
"model": "telepresence server software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1\\(1.33\\)"
},
{
"model": "telepresence server software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1\\(1.37\\)"
},
{
"model": "telepresence server software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.2\\(1.43\\)"
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.1\\(1.51\\)"
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.2\\(1.43\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.43\\)"
},
{
"model": "telepresence mcu 4501",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4505",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.50\\)"
},
{
"model": "telepresence mcu mse series software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(2.18\\)"
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.46\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(2.18\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.46\\)"
},
{
"model": "telepresence mcu mse 8510",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.1\\(1.59\\)"
},
{
"model": "telepresence server 7010",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(1.68\\)"
},
{
"model": "telepresence mcu 4515",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.50\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.1\\(1.59\\)"
},
{
"model": "telepresence server mse 8710",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.50\\)"
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(1.68\\)"
},
{
"model": "telepresence mcu 4501 series software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(2.18\\)"
},
{
"model": "telepresence mcu 4500 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.3\\(1.68\\)"
},
{
"model": "telepresence server software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "2.2\\(1.54\\)"
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.1\\(1.51\\)"
},
{
"model": "telepresence mcu 4520",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4501 series software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "4.2\\(1.43\\)"
},
{
"model": "telepresence mcu 4510",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4500 series software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "4.3(2.30)"
},
{
"model": "telepresence mcu 4501",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4501 series software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "4.3(2.30)"
},
{
"model": "telepresence mcu 4505",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4510",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4515",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu 4520",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu mse 8510",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence mcu mse series software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "4.3(2.30)"
},
{
"model": "telepresence server 7010",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence server mse 8710",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence server software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "2.3(1.55)"
},
{
"model": "telepresence server software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "2.2\\(1.54\\)"
},
{
"model": "telepresence mcu mse series software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4.3\\(2.18\\)"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.3\\(2.18\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4500_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_4520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_4515:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_4505:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_4510:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.3\\(2.18\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_4501_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_4501:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.3\\(1.68\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.46\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.51\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.1\\(1.59\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.3\\(2.18\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.50\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_mcu_mse_series_software:4.2\\(1.43\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_mcu_mse_8510:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.33\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_server_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2\\(1.54\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_server_software:2.1\\(1.37\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_server_software:2.2\\(1.43\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_server_7010:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_server_mse_8710:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-1176"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "59272"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
}
],
"trust": 0.9
},
"cve": "CVE-2013-1176",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.1,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2013-1176",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-61178",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-1176",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201304-418",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-61178",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61178"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called \"Telepresence\" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a \"face-to-face\" virtual conference room effect. \nA denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "BID",
"id": "59272"
},
{
"db": "VULHUB",
"id": "VHN-61178"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-1176",
"trust": 2.8
},
{
"db": "BID",
"id": "59272",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397",
"trust": 0.6
},
{
"db": "SECUNIA",
"id": "53129",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20130417 CISCO TELEPRESENCE INFRASTRUCTURE DENIAL OF SERVICE VULNERABILITY",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-61178",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61178"
},
{
"db": "BID",
"id": "59272"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"id": "VAR-201304-0287",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-61178"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:45:33.209000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20130417-tpi",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130417-tpi"
},
{
"title": "28929",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=28929"
},
{
"title": "cisco-sa-20130417-tpi",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/111/1117/1117760_cisco-sa-20130417-tpi-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61178"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130417-tpi"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1176"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1176"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/59272"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/53129"
},
{
"trust": 0.3,
"url": "http://www.cisco.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61178"
},
{
"db": "BID",
"id": "59272"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-61178"
},
{
"db": "BID",
"id": "59272"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-04-18T00:00:00",
"db": "VULHUB",
"id": "VHN-61178"
},
{
"date": "2013-04-17T00:00:00",
"db": "BID",
"id": "59272"
},
{
"date": "2013-04-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"date": "2013-04-18T18:55:03.970000",
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"date": "2013-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"date": "2013-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-04-19T00:00:00",
"db": "VULHUB",
"id": "VHN-61178"
},
{
"date": "2013-04-22T12:50:00",
"db": "BID",
"id": "59272"
},
{
"date": "2013-04-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002413"
},
{
"date": "2013-04-19T04:00:00",
"db": "NVD",
"id": "CVE-2013-1176"
},
{
"date": "2013-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"date": "2013-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Cisco TelePresence Product denial of service vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201304-397"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201304-418"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.