2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-0531" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2008-02-15T02:00:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:42:19.290" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Heap-based buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SIP firmware might allow remote SIP servers to execute arbitrary code via a crafted challenge/response message."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer basado en mont\u00edculo en los tel\u00e9fonos Cisco Unified IP Phone 7940, 7940G, 7960 y 7960G ejecut\u00e1ndose en un software empotrado (firmware) SIP, puede que permita a servidores SIP remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un mensaje de desaf\u00edo/respuesta."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53A9A468-CAC3-4DC6-B839-557DBE8246D3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26830222-1503-4748-A104-334265D8F06F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19712324-A41D-49F1-AA74-3B30A731FF47"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "43F9E1FE-4BD5-40B9-B239-B2185821A551"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "987BEE5F-5686-4B83-A6EF-903C86439BB3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFE61DF2-3D61-400F-BA70-B506412C9C28"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EE292B7-DFC7-402C-BC10-9293D32B75B3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "648AFF80-3F8B-4966-9899-530F498C8B3B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F0B76F56-31D4-4576-AC95-00AED498F25A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2747DB12-83B9-40E4-9671-382E241C98EE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FDB3D25-274E-42F5-B5C1-B2A7875F94EE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "987BEE5F-5686-4B83-A6EF-903C86439BB3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EE292B7-DFC7-402C-BC10-9293D32B75B3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "648AFF80-3F8B-4966-9899-530F498C8B3B"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "780CE3C9-7CA3-4770-8DC9-BCB3365C32F9"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/28935" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-04-04 08:46:00 +00:00
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/27774" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securitytracker.com/id?1019411" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0543" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40498" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://secunia.com/advisories/28935" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/27774" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id?1019411" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/0543" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40498" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
2024-11-22 07:15:30 +00:00
] ,
"evaluatorSolution" : "Patch requires login"
2023-04-24 12:24:31 +02:00
}