mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
245 lines
8.1 KiB
JSON
245 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2011-2577",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2011-08-31T23:55:03.300",
|
|
"lastModified": "2018-10-09T19:32:44.510",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad no especificada en TelePresence C Series Endpoints de Cisco, unidades E/EX Personal Video, y MXP Series Codecs, cuando se utilizan las versiones de software anterior a versiones 4.0.0 o F9.1 del TC, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de un paquete SIP dise\u00f1ado al puerto 5060 o 5061, tambi\u00e9n se conoce como Bug ID CSCtq46500."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C5E2223-2180-4D0F-9E34-8AF54DC97FE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "001596FF-7961-4983-8E1B-E272C94958EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CBC21F7C-240C-446E-BDF6-3E1AB9B05B4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_ex60:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6817FE7D-7326-48A4-B0D4-82D086A59789"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_ex90:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE5666DD-9D12-4B3F-8E36-E86A74FD63CF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "tc3.1.4",
|
|
"matchCriteriaId": "8A0C0F89-EB02-44F7-8C5B-5F1BB6F7B78E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50105F72-7662-4501-A636-12B0CA39F3AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDC54B18-A85D-4E7D-92EA-E41B7BBFE674"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE78B49E-437A-4152-A900-A4970820B651"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60241812-BAAA-4B09-8081-0E56E3F17D1B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AEB09627-26D5-44AE-9A25-3B6FF42DB4BC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_6000_mxp:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "059AF6E3-0E8A-4C80-85D2-92E4F6C1148F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_9000_mxp:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33339F8B-49B8-4601-974B-25954B13DFD8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DE1AE6C-A4A2-4B30-908C-B762C7FF3731"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35C323D0-15A4-4639-9DDC-513BD7EEC5E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B30A62F0-46F1-4F5E-9359-034609462F37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E634F54-2913-4BAD-A6C6-93A0043A6253"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:telepresence_e20:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C4723AA-DB31-4528-9B0E-DA89A0A48EEA"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8387",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8389",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.exploit-db.com/exploits/17871",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/49392",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1025994",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |