mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
266 lines
9.5 KiB
JSON
266 lines
9.5 KiB
JSON
{
|
|
"id": "CVE-2007-1833",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2007-04-03T00:19:00.000",
|
|
"lastModified": "2024-11-21T00:29:15.967",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Skinny Call Control Protocol (SCCP) implementation in Cisco Unified CallManager (CUCM) 3.3 before 3.3(5)SR2a, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3)SR1, and 5.0 before 5.0(4a)SU1 allows remote attackers to cause a denial of service (loss of voice services) by sending crafted packets to the (1) SCCP (2000/tcp) or (2) SCCPS (2443/tcp) port."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La implementaci\u00f3n del protocolo Skinny Call Control (SCCP) para el Cisco Unified CallManager (CUCM) 3.3 anterior al 3.3(5)SR2a, 4.1 anterior al 4.1(3)SR4, 4.2 anterior al 4.2(3)SR1 y 5.0 anterior al 5.0(4a)SU1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e9rdida del servicio de voz) mediante el env\u00edo de paquetes modificados al puerto (1) SCCP (2000/tcp) o (2) SCCPS (2443/tcp)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "490CBADD-C3A0-4274-B44A-B260944DF4AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E31A571C-9F1F-409E-A80B-BAC0B4D6D156"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(2\\)spb:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F45C710A-9FC4-41BD-A687-7BCC8BF6C188"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(2\\)spc:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D219B98-0862-4A73-9BF4-3EB5312F8311"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52F78BD0-89CD-423E-992D-BA4571E4B2B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(3\\)sr1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "935E2870-47B2-4060-B210-DB4D592184B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(3\\)sr4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDDA2970-A899-44D2-9D79-3AB8076DD64E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8734CCC0-480A-4BB6-9229-E9330E804F49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(4\\)sr1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E10555C-5867-47D2-B28D-37059D21666D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89C97505-B950-4504-A39E-84650FD11DA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D826CEFC-07D9-42AB-A3B7-3D413FF33278"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:3.3\\(5\\)sr1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "007F68B2-4B93-49EF-BE24-4B02F8FE20BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC772518-51CC-4692-BEB2-2C9C2A215F44"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9FA7E8CF-B373-439C-A2F8-5792C88849D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E90C926-6741-4E17-A25A-182BEFF7D304"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78B94D63-A505-491B-8882-3CFEFA8031B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E17255F3-9E15-482F-BD77-22B5B0F900B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0D020BDD-3DA2-424B-9EA2-2ED7DA79AD25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A5E0999-9FB7-4255-A8CF-5D74E70FD56A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37FEF567-5F92-40BB-8581-3FCF584AAA1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5865997-F8B2-4ABB-96DF-3AE691A7CE5B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9211420-9F35-4872-879A-5F7CA29C6299"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7DD4B55-4C68-45CD-988E-D470C26E5E71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(3a\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48C1B081-1FD7-4BBD-84BD-E1E5F80C74FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC32C417-3E61-4892-9A42-C31C6D62F09D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/24665",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017826",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070328-voip.shtml",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23181",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1144",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33295",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24665",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1017826",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070328-voip.shtml",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/23181",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1144",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33295",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |