var-201401-0325
Vulnerability from variot
The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796. Cisco TelePresence System is prone to an arbitrary command-execution vulnerability. Remote attackers can exploit this issue to execute arbitrary calls through stack corruption with the privilege of the root user. This issue being tracked by Cisco Bug ID CSCui32796. The solution provides components such as audio and video space, which can provide remote participants with a face-to-face virtual meeting room effect. The following versions are affected: Cisco TelePresence System 500-37, 1000, 1300-65, 3xxx prior to 1.10.2(42), 500-32, 1300-47, TX1310 65, TX9xxx prior to 6.0.4(11)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0325", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.0.1\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.10.0" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.2\\(28\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0.1\\(50\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.10.0\\(259\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1.0\\(90\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.5.10\\(3648\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.10.1" }, { "model": "telepresence system 3210", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system 3200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system tx9200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.6\\(4\\)" }, { "model": "telepresence system 1000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.5\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.4\\(13\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.4\\(19\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.3\\(4\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.6.1\\(3\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.1\\(68\\)" }, { "model": "telepresence system tx9000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "6.0.3\\(33\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.5\\(7\\)" }, { "model": "telepresence system 1300-65", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system 1100", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.2\\(19\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.6\\(2\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.0\\(46\\)" }, { "model": "telepresence system software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.10.1\\(43\\)" }, { "model": "telepresence system 3010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.9.3\\(44\\)" }, { "model": "telepresence system tx1310 65", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.7.5\\(42\\)" }, { "model": "telepresence system 3000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.0\\(55\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.2\\(11\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.8.1\\(34\\)" }, { "model": "telepresence system 500-37", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system tx1300 47", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "telepresence system 500-32", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence system 1000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 1100", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 1300-65", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3010", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3200", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 3210", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 500-32", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system 500-37", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.10.2(42) (500-37" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1000" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1300-65" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3000" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3010" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3200" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3210)" }, { "model": "telepresence system software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "6.0.4(11) (500-32" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1300-47" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "tx1310 65" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "tx9000" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "tx9200)" }, { "model": "telepresence system tx1300 47", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system tx1310 65", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system tx9000", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system tx9200", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence system software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.10.1\\(43\\)" }, { "model": "telepresence system software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6.0.3\\(33\\)" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.3\\(44\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.2\\(19\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.1\\(34\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.0\\(55\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.5\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.4\\(19\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.3\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.2\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0\\(259\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.1\\(68\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.0\\(46\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.6\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.7.5\\(42\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.9.6\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.5\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.8.4\\(13\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:1.5.10\\(3648\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.10.1\\(43\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3010:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1300-65:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3210:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_3200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.0.3\\(33\\)", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.1.0\\(90\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.0.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.1\\(50\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:telepresence_system_software:6.0.2\\(28\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx1310_65:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_1100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx9200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_tx1300_47:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0661" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "65071" } ], "trust": 0.3 }, "cve": "CVE-2014-0661", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-0661", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-68154", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-0661", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201401-427", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-68154", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-68154" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The System Status Collection Daemon (SSCD) in Cisco TelePresence System 500-37, 1000, 1300-65, and 3xxx before 1.10.2(42), and 500-32, 1300-47, TX1310 65, and TX9xxx before 6.0.4(11), allows remote attackers to execute arbitrary commands or cause a denial of service (stack memory corruption) via a crafted XML-RPC message, aka Bug ID CSCui32796. Cisco TelePresence System is prone to an arbitrary command-execution vulnerability. \nRemote attackers can exploit this issue to execute arbitrary calls through stack corruption with the privilege of the root user. \nThis issue being tracked by Cisco Bug ID CSCui32796. The solution provides components such as audio and video space, which can provide remote participants with a face-to-face virtual meeting room effect. The following versions are affected: Cisco TelePresence System 500-37, 1000, 1300-65, 3xxx prior to 1.10.2(42), 500-32, 1300-47, TX1310 65, TX9xxx prior to 6.0.4(11) ", "sources": [ { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "BID", "id": "65071" }, { "db": "VULHUB", "id": "VHN-68154" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0661", "trust": 2.8 }, { "db": "BID", "id": "65071", "trust": 1.4 }, { "db": "SECUNIA", "id": "56533", "trust": 1.1 }, { "db": "SECTRACK", "id": "1029656", "trust": 1.1 }, { "db": "OSVDB", "id": "102362", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-001231", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201401-427", "trust": 0.7 }, { "db": "CISCO", "id": "20140122 CISCO TELEPRESENCE SYSTEM SOFTWARE COMMAND EXECUTION VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-68154", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-68154" }, { "db": "BID", "id": "65071" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "id": "VAR-201401-0325", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-68154" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:08:53.863000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130807-tp", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130807-tp" }, { "title": "30323", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30323" }, { "title": "cisco-sa-20140122-cts", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/112/1121/1121768_cisco-sa-20140122-cts-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-001231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-68154" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140122-cts" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/65071" }, { "trust": 1.1, "url": "http://osvdb.org/102362" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1029656" }, { "trust": 1.1, "url": "http://secunia.com/advisories/56533" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90624" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0661" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0661" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-68154" }, { "db": "BID", "id": "65071" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-68154" }, { "db": "BID", "id": "65071" }, { "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "db": "NVD", "id": "CVE-2014-0661" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-22T00:00:00", "db": "VULHUB", "id": "VHN-68154" }, { "date": "2014-01-22T00:00:00", "db": "BID", "id": "65071" }, { "date": "2014-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "date": "2014-01-22T21:55:03.560000", "db": "NVD", "id": "CVE-2014-0661" }, { "date": "2014-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-68154" }, { "date": "2014-01-28T00:33:00", "db": "BID", "id": "65071" }, { "date": "2014-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-001231" }, { "date": "2017-08-29T01:34:14.250000", "db": "NVD", "id": "CVE-2014-0661" }, { "date": "2014-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201401-427" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-427" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco TelePresence System Arbitrary Command Execution Vulnerability", "sources": [ { "db": "BID", "id": "65071" }, { "db": "CNNVD", "id": "CNNVD-201401-427" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201401-427" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.