Executive Summary
Summary | |
---|---|
Title | Cisco Unified Communications Manager Overflow Vulnerabilities |
Informations | |||
---|---|---|---|
Name | cisco-sa-20070711-cucm | First vendor Publication | 2007-06-04 |
Vendor | Cisco | Last vendor Modification | 2007-07-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Unified Communications Manager (CUCM), formerly CallManager, and Cisco Unified Presence Server (CUPS) contain two vulnerabilities that could allow an unauthorized administrator to activate and terminate CUCM / CUPS system services and access SNMP configuration information. |
Original Source
Url : http://www.cisco.com/warp/public/707/cisco-sa-20070711-cucm.shtml |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
36122 | Cisco Unified Communications Manager (CUCM) Certificate Trust List (CTL) Prov... A heap overflow exists in CallManager and Communications Manager. The Certificate Trust List Provider Service fails to validate received packets resulting in a heap overflow. With a specially crafted packet, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
36121 | Cisco Unified Communications Manager (CUCM) Real-Time Information Server (RIS... A buffer overflow exists in Cisco Unified Communications Manager (formerly CallManager). The RIS Data Collector Service fails to validate unspecified input data resulting in a heap overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity. |