Executive Summary
Summary | |
---|---|
Title | Cisco TelePresence MCU Software Memory Exhaustion Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20141015-mcu | First vendor Publication | 2014-10-15 |
Vendor | Cisco | Last vendor Modification | 2014-10-15 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the network stack of Cisco TelePresence MCU Software could allow an unauthenticated, remote attacker to cause the exhaustion of available memory which could lead to system instability and a reload of the affected system. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-mcu BEGIN PGP SIGNATURE Version: GnuPG v1.4.5 (SunOS) iQIVAwUBVD6PuopI1I6i1Mx3AQIoTA/8CLL2URdaLZq8admPaFm/i4tVWu890ZSr IhV68RhjbDUQMAhRb8XldfizlYiQSkZqh5tVw8u2r4ksHftnBsuTxyfVBA/+d+XK 6/Pfr15JlzhfoJgG5hD4KAvpyS+VGoM3ST2Z0iRykDk6+/T8hDLItzmrivyNPQ3K PQw82YMArGL1TTcdTjmUHm9F7Kqg2wzR+F0K5swv/Z+P+rflBATszNcltpfEd7kt AmIquiUyg9c0n9z27zNDJzqjHvIcuwVB0NcneH9X2tRW0V3x5ske71TTVqdSSlau UPLESYUnNewXUpfylCvnvC5LQOCwrG5871kfgdOEYLyrqtk2iL9/xRUkzCeHvGj/ O9QmG2HoCvStvABQVdChgEFE349eGNuZ5Rm/TiqBUtAl1o1cND+q9NsCprGAYxLl 7ZkyzlQ8tpbmIbkb0ehv5Mc8lZaeE0Pnfg2KuPVIcfhpmK2LyIErPU1TdU0pTe9f O4P5HoOVD5DyfUvCueTr9+Fa/uJKcZP8XCgBTPB5EHHU4H992/lQJ3lejgbYlHlS YaNy7+ccaXREgtly29TFwJ8guMDYTiVKPtzcuyveGfIKkP9/kxtoPVWzRpE7Gq52 LafhNCMXZ1rSGUPf348n3OqsYI8EsvHWFwMvfWZ8hs1KktIrn2+pPZNAgLpl/sCJ BqwBif7+3sk= =nJrb END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-22 | Name : The remote device is affected by a flaw that can allow a denial of service vi... File : cisco_telepresence_mcu_sa_20141015.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-10-23 13:24:50 |
|
2014-10-23 00:29:14 |
|
2014-10-15 21:22:13 |
|