VAR-201410-0993
Vulnerability from variot - Updated: 2023-12-18 12:07Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.2 allow remote attackers to cause a denial of service (device reload) via a high rate of crafted packets, aka Bug ID CSCui06507. Vendors report this vulnerability Bug ID CSCui06507 Published as.Denial of service via third-party, heavily crafted packets ( Device reload ) May be in a state. An attacker can exploit this issue to cause the kernel to crash and reload the affected system, denying service to legitimate users. The issue is documented by Cisco Bug ID CSCui06507
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201410-0993",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "expressway software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "x8.1"
},
{
"model": "telepresence video communication server software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "x8.1"
},
{
"model": "expressway software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "x8.2"
},
{
"model": "telepresence video communication server",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence video communication server software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "x8.2"
},
{
"model": "expressway software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "x8.1"
},
{
"model": "telepresence video communication server software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "x8.1"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_video_communication_server_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "x8.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:expressway_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "x8.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3368"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "70589"
}
],
"trust": 0.3
},
"cve": "CVE-2014-3368",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-3368",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-71308",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-3368",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201410-628",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-71308",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71308"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence Video Communication Server (VCS) and Expressway Software before X8.2 allow remote attackers to cause a denial of service (device reload) via a high rate of crafted packets, aka Bug ID CSCui06507. Vendors report this vulnerability Bug ID CSCui06507 Published as.Denial of service via third-party, heavily crafted packets ( Device reload ) May be in a state. \nAn attacker can exploit this issue to cause the kernel to crash and reload the affected system, denying service to legitimate users. \nThe issue is documented by Cisco Bug ID CSCui06507",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "BID",
"id": "70589"
},
{
"db": "VULHUB",
"id": "VHN-71308"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3368",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "60850",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1031055",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628",
"trust": 0.7
},
{
"db": "BID",
"id": "70589",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-71308",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71308"
},
{
"db": "BID",
"id": "70589"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"id": "VAR-201410-0993",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-71308"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:07:53.453000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20141015-vcs",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141015-vcs"
},
{
"title": "22477",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=22477"
},
{
"title": "cisco-sa-20141015-vcs",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/112/1126/1126346_cisco-sa-20141015-vcs-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71308"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141015-vcs"
},
{
"trust": 1.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35827"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1031055"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/60850"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3368"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3368"
},
{
"trust": 0.3,
"url": "www.cisco.com/en/us/products/ps11337/index.html"
},
{
"trust": 0.3,
"url": "www.cisco.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71308"
},
{
"db": "BID",
"id": "70589"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-71308"
},
{
"db": "BID",
"id": "70589"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-10-19T00:00:00",
"db": "VULHUB",
"id": "VHN-71308"
},
{
"date": "2014-10-15T00:00:00",
"db": "BID",
"id": "70589"
},
{
"date": "2014-10-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"date": "2014-10-19T01:55:13.480000",
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"date": "2014-10-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-10-08T00:00:00",
"db": "VULHUB",
"id": "VHN-71308"
},
{
"date": "2014-10-15T00:00:00",
"db": "BID",
"id": "70589"
},
{
"date": "2014-10-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004980"
},
{
"date": "2015-10-08T15:17:14.770000",
"db": "NVD",
"id": "CVE-2014-3368"
},
{
"date": "2014-10-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence Video Communication Server and Expressway Denial of service in software (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004980"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201410-628"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…