VAR-201405-0477
Vulnerability from variot - Updated: 2023-12-18 12:30Cisco WebEx Recording Format (WRF) player and Advanced Recording Format (ARF) player T27 LD before SP32 EP16, T28 before T28.12, and T29 before T29.2 allow remote attackers to cause a denial of service (application crash) via a crafted (1) .wrf or (2) .arf file that triggers a buffer over-read, aka Bug ID CSCuh52768. Cisco WebEx WRF and ARF Players are prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuh52768
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201405-0477",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webex advanced recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t28"
},
{
"model": "webex recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t27ld"
},
{
"model": "webex recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t29"
},
{
"model": "webex recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t28"
},
{
"model": "webex advanced recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t27ld"
},
{
"model": "webex advanced recording format player",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "t29"
},
{
"model": "webex advanced recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t27 ld thats all t27 ld sp32 ep16"
},
{
"model": "webex advanced recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t28 thats all t28.12"
},
{
"model": "webex advanced recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t29 thats all t29.2"
},
{
"model": "webex recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t27 ld thats all t27 ld sp32 ep16"
},
{
"model": "webex recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t28 thats all t28.12"
},
{
"model": "webex recording format player",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "t29 thats all t29.2"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_recording_format_player:t28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_advanced_recording_format_player:t28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_recording_format_player:t29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_advanced_recording_format_player:t29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_advanced_recording_format_player:t27ld:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:webex_recording_format_player:t27ld:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2132"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Fortinet",
"sources": [
{
"db": "BID",
"id": "67259"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2132",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-2132",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-70071",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2132",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201405-155",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-70071",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70071"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco WebEx Recording Format (WRF) player and Advanced Recording Format (ARF) player T27 LD before SP32 EP16, T28 before T28.12, and T29 before T29.2 allow remote attackers to cause a denial of service (application crash) via a crafted (1) .wrf or (2) .arf file that triggers a buffer over-read, aka Bug ID CSCuh52768. Cisco WebEx WRF and ARF Players are prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected application, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCuh52768",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "BID",
"id": "67259"
},
{
"db": "VULHUB",
"id": "VHN-70071"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2132",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20140507 MULTIPLE VULNERABILITIES IN THE CISCO WEBEX RECORDING FORMAT AND ADVANCED RECORDING FORMAT PLAYERS",
"trust": 0.6
},
{
"db": "BID",
"id": "67259",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-70071",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70071"
},
{
"db": "BID",
"id": "67259"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"id": "VAR-201405-0477",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-70071"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:30:40.861000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20140507-webex",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140507-webex"
},
{
"title": "34029",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34029"
},
{
"title": "cisco-sa-20140507-webex",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/112/1122/1122550_cisco-sa-20140507-webex-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70071"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140507-webex"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2132"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2132"
},
{
"trust": 0.3,
"url": "http://www.webex.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70071"
},
{
"db": "BID",
"id": "67259"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-70071"
},
{
"db": "BID",
"id": "67259"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-70071"
},
{
"date": "2014-05-07T00:00:00",
"db": "BID",
"id": "67259"
},
{
"date": "2014-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"date": "2014-05-08T10:55:03.700000",
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"date": "2014-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-70071"
},
{
"date": "2014-05-07T00:00:00",
"db": "BID",
"id": "67259"
},
{
"date": "2014-05-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002424"
},
{
"date": "2014-05-08T13:21:48.667000",
"db": "NVD",
"id": "CVE-2014-2132"
},
{
"date": "2014-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco WebEx Recording Format Player and Advanced Recording Format Player Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002424"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-155"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…