2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-0526" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2008-02-15T02:00:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:42:18.710" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a long ICMP echo request (ping) packet."
} ,
{
"lang" : "es" ,
"value" : "Los tel\u00e9fonos Cisco Unified IP Phone 7940, 7940G, 7960 y 7960G ejecut\u00e1ndose en software empotrado (firmware) SCCP permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio) mediante un paquete de petici\u00f3n de eco ICMP (ping) grande."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53A9A468-CAC3-4DC6-B839-557DBE8246D3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26830222-1503-4748-A104-334265D8F06F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19712324-A41D-49F1-AA74-3B30A731FF47"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43F9E1FE-4BD5-40B9-B239-B2185821A551"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "987BEE5F-5686-4B83-A6EF-903C86439BB3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFE61DF2-3D61-400F-BA70-B506412C9C28"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EE292B7-DFC7-402C-BC10-9293D32B75B3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "648AFF80-3F8B-4966-9899-530F498C8B3B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F0B76F56-31D4-4576-AC95-00AED498F25A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2747DB12-83B9-40E4-9671-382E241C98EE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FDB3D25-274E-42F5-B5C1-B2A7875F94EE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "987BEE5F-5686-4B83-A6EF-903C86439BB3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EE292B7-DFC7-402C-BC10-9293D32B75B3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "648AFF80-3F8B-4966-9899-530F498C8B3B"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "780CE3C9-7CA3-4770-8DC9-BCB3365C32F9"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/28935" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-04-04 08:46:00 +00:00
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/27774" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securitytracker.com/id?1019407" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0543" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40487" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://secunia.com/advisories/28935" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/27774" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id?1019407" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0543" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40487" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
2024-11-22 07:15:30 +00:00
] ,
"evaluatorSolution" : "In order to download the patch, login is required"
2023-04-24 12:24:31 +02:00
}