var-201407-0379
Vulnerability from variot
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297. Cisco Unified Communications Manager is prone to an arbitrary file-upload vulnerability. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. This issue is being tracked by Cisco Bug ID CSCup76297. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0379", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unified communications manager", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0\\(1\\)_base" }, { "model": "unified communications manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "10.0(1)" }, { "model": "unified communications manager", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager:10.0\\(1\\)_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3316" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "68479" } ], "trust": 0.3 }, "cve": "CVE-2014-3316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-3316", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-71256", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3316", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201407-256", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71256" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297. Cisco Unified Communications Manager is prone to an arbitrary file-upload vulnerability. \nAn attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. \nThis issue is being tracked by Cisco Bug ID CSCup76297. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers", "sources": [ { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "BID", "id": "68479" }, { "db": "VULHUB", "id": "VHN-71256" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3316", "trust": 2.8 }, { "db": "BID", "id": "68479", "trust": 1.4 }, { "db": "SECUNIA", "id": "59730", "trust": 1.1 }, { "db": "SECTRACK", "id": "1030554", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-003310", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201407-256", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-71256", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71256" }, { "db": "BID", "id": "68479" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "id": "VAR-201407-0379", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71256" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:03:32.339000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco Unified Communications Manager DNA Arbitrary File Upload Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3316" }, { "title": "34899", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34899" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003310" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71256" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3316" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/68479" }, { "trust": 1.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34899" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1030554" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59730" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94429" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3316" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3316" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71256" }, { "db": "BID", "id": "68479" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71256" }, { "db": "BID", "id": "68479" }, { "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "db": "NVD", "id": "CVE-2014-3316" }, { "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-10T00:00:00", "db": "VULHUB", "id": "VHN-71256" }, { "date": "2014-07-09T00:00:00", "db": "BID", "id": "68479" }, { "date": "2014-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "date": "2014-07-10T11:06:28.020000", "db": "NVD", "id": "CVE-2014-3316" }, { "date": "2014-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-71256" }, { "date": "2014-07-14T00:57:00", "db": "BID", "id": "68479" }, { "date": "2014-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003310" }, { "date": "2017-08-29T01:34:41.827000", "db": "NVD", "id": "CVE-2014-3316" }, { "date": "2014-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-256" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-256" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Unified Communications Manager of Dialed Number Analyzer Vulnerability that bypasses upload restrictions in components", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003310" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-256" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.