mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
186 lines
7.1 KiB
JSON
186 lines
7.1 KiB
JSON
{
|
|
"id": "CVE-2015-0613",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2015-04-03T18:59:01.490",
|
|
"lastModified": "2015-09-29T19:32:43.423",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul20444."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El proceso Connection Conversation Manager (tambi\u00e9n conocido como CuCsMgr) en Cisco Unity Connection 8.5 anterior a 8.5(1)SU7, 8.6 anterior a 8.6(2a)SU4, 9.x anterior a 9.1(2)SU2, y 10.0 anterior a 10.0(1)SU1, cuando la integraci\u00f3n SIP 'trunk' est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (volcado de n\u00facleo y reinicio) a trav\u00e9s de mensajes SIP INVITE manipulados, tambi\u00e9n conocido como Bug ID CSCul20444."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.1
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-19"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "101FCDD0-DC91-4111-975E-DE618D3B4E9A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D386D8CD-D6EA-4705-ABDC-EA6558F5AC30"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4B1917B-197C-4E28-9356-2ACC4C4DB932"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5567A000-338E-40D7-9481-674B8FFC142D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA991A88-D49E-4957-B404-6E3C15C96994"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BECA1F06-6FFD-4A0D-B140-B25E39FB8513"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2ADCE50E-87C1-49D7-B127-92174327EAB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D11810A-80D7-41BB-B370-30218FF52F17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C547C041-6C58-44D5-93D7-C02E04E93994"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C40F61A6-A992-4DA4-9730-D145055596C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78970987-BD6E-48A0-AF43-540C925E1F97"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "632B8CDD-5ACC-4FFB-950B-480CC43D192D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7740A5EF-538E-4095-91F5-E4DC03EDB35B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D805DD4A-269D-4399-B6BF-7F40F98C3BE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A06A53BA-668B-41C0-B223-6637487EF113"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82B3ABB4-A33A-4886-9871-C24B33B3AEE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:9.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6793E1F6-DC57-4A13-B49D-0ED45E48426C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:9.1\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50CD06E4-0C09-4DD7-B106-56DC680CE333"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:9.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA2751A8-A3CF-4CC7-A7F2-003165C1AEDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:10.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A49C1C0B-4B2A-4F13-996D-E3ED1F96C2A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity_connection:10.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5CC8FF5-F0FA-41E8-AD78-D277AB9776DB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1032010",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |