{ "id": "CVE-2010-0142", "sourceIdentifier": "ykramarz@cisco.com", "published": "2010-01-28T20:30:01.557", "lastModified": "2010-01-31T05:00:00.000", "vulnStatus": "Analyzed", "evaluatorComment": "Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml\r\n\r\n\r\nAffected Products\r\nVulnerable Products\r\n\r\nCisco Unified MeetingPlace versions 5, 6, and 7 are each affected by at least one of the vulnerabilities described in this document.\r\n\r\n", "descriptions": [ { "lang": "en", "value": "MeetingTime in Cisco Unified MeetingPlace 6 before MR5, and possibly 5, allows remote authenticated users to gain privileges via a modified authentication sequence, aka Bug ID CSCsv66530." }, { "lang": "es", "value": "MeetingTime en Cisco Unified MeetingPlace v6 anteriores a MR5, y posiblemente v5, permite a usuarios remotos autenticados ganar privilegios a trav\u00e9s de una secuencia modificada de autenticaci\u00f3n, tambi\u00e9n conocido como bug ID CSCsv66530." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 8.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:unified_meetingplace:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BEEA514-EE52-4BB3-97BD-04246D6F6D7B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:unified_meetingplace:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8F37B63-53F3-4497-BF6D-22E1C1D5D2C3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:unified_meetingplace:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A19AF4C2-980E-4FDA-8EA3-372C313C037B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:unified_meetingplace:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "52D721B4-C0B8-4B7C-8C18-6B6B699B48E0" } ] } ] } ], "references": [ { "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1490b.shtml", "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/37965", "source": "ykramarz@cisco.com" } ] }