Executive Summary

Summary
Title Cisco TelePresence MCU Software Memory Exhaustion Vulnerability
Informations
Name cisco-sa-20141015-mcu First vendor Publication 2014-10-15
Vendor Cisco Last vendor Modification 2014-10-15
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the network stack of Cisco TelePresence MCU Software could allow an unauthenticated, remote attacker to cause the exhaustion of available memory which could lead to system instability and a reload of the affected system.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-mcu

BEGIN PGP SIGNATURE Version: GnuPG v1.4.5 (SunOS)

iQIVAwUBVD6PuopI1I6i1Mx3AQIoTA/8CLL2URdaLZq8admPaFm/i4tVWu890ZSr IhV68RhjbDUQMAhRb8XldfizlYiQSkZqh5tVw8u2r4ksHftnBsuTxyfVBA/+d+XK 6/Pfr15JlzhfoJgG5hD4KAvpyS+VGoM3ST2Z0iRykDk6+/T8hDLItzmrivyNPQ3K PQw82YMArGL1TTcdTjmUHm9F7Kqg2wzR+F0K5swv/Z+P+rflBATszNcltpfEd7kt AmIquiUyg9c0n9z27zNDJzqjHvIcuwVB0NcneH9X2tRW0V3x5ske71TTVqdSSlau UPLESYUnNewXUpfylCvnvC5LQOCwrG5871kfgdOEYLyrqtk2iL9/xRUkzCeHvGj/ O9QmG2HoCvStvABQVdChgEFE349eGNuZ5Rm/TiqBUtAl1o1cND+q9NsCprGAYxLl 7ZkyzlQ8tpbmIbkb0ehv5Mc8lZaeE0Pnfg2KuPVIcfhpmK2LyIErPU1TdU0pTe9f O4P5HoOVD5DyfUvCueTr9+Fa/uJKcZP8XCgBTPB5EHHU4H992/lQJ3lejgbYlHlS YaNy7+ccaXREgtly29TFwJ8guMDYTiVKPtzcuyveGfIKkP9/kxtoPVWzRpE7Gq52 LafhNCMXZ1rSGUPf348n3OqsYI8EsvHWFwMvfWZ8hs1KktIrn2+pPZNAgLpl/sCJ BqwBif7+3sk= =nJrb END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

Nessus® Vulnerability Scanner

Date Description
2014-10-22 Name : The remote device is affected by a flaw that can allow a denial of service vi...
File : cisco_telepresence_mcu_sa_20141015.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-10-23 13:24:50
  • Multiple Updates
2014-10-23 00:29:14
  • Multiple Updates
2014-10-15 21:22:13
  • First insertion