fkie_cve-2010-0587
Vulnerability from fkie_nvd
Published
2010-03-05 16:30
Modified
2024-11-21 01:12
Severity ?
Summary
Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x before 4.3(2)SR2, 6.x before 6.1(5), 7.x before 7.1(3a)su1, and 8.x before 8.0(1) allows remote attackers to cause a denial of service (process failure) via a malformed SCCP StationCapabilitiesRes message with an invalid MaxCap field, aka Bug ID CSCtc38985.
Impacted products
Vendor Product Version
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1
cisco unified_communications_manager 4.1\(3\)
cisco unified_communications_manager 4.1\(3\)sr1
cisco unified_communications_manager 4.1\(3\)sr2
cisco unified_communications_manager 4.1\(3\)sr3
cisco unified_communications_manager 4.1\(3\)sr4
cisco unified_communications_manager 4.1.1
cisco unified_communications_manager 4.1.2
cisco unified_communications_manager 4.1.3
cisco unified_communications_manager 4.2
cisco unified_communications_manager 4.2
cisco unified_communications_manager 4.2
cisco unified_communications_manager 4.2
cisco unified_communications_manager 4.2\(3\)sr1
cisco unified_communications_manager 4.2\(3\)sr2b
cisco unified_communications_manager 4.2\(3\)sr3
cisco unified_communications_manager 4.2\(3\)sr4
cisco unified_communications_manager 4.2.1
cisco unified_communications_manager 4.2.2
cisco unified_communications_manager 4.2.3
cisco unified_communications_manager 4.2.3_sr3
cisco unified_communications_manager 4.2.3sr1
cisco unified_communications_manager 4.2.3sr2
cisco unified_communications_manager 4.2.3sr2b
cisco unified_communications_manager 4.2_1
cisco unified_communications_manager 4.2_2
cisco unified_communications_manager 4.2_3
cisco unified_communications_manager 4.2_3sr1
cisco unified_communications_manager 4.3
cisco unified_communications_manager 4.3
cisco unified_communications_manager 4.3\(1\)
cisco unified_communications_manager 4.3\(1\)sr.1
cisco unified_communications_manager 4.3\(2\)
cisco unified_communications_manager 4.3\(2\)sr1
cisco unified_communications_manager 4.3.1
cisco unified_communications_manager 4.3_1
cisco unified_communications_manager 6.0
cisco unified_communications_manager 6.0\(1\)
cisco unified_communications_manager 6.0\(1a\)
cisco unified_communications_manager 6.1
cisco unified_communications_manager 6.1
cisco unified_communications_manager 6.1\(1\)
cisco unified_communications_manager 6.1\(1a\)
cisco unified_communications_manager 6.1\(1b\)
cisco unified_communications_manager 6.1\(2\)
cisco unified_communications_manager 6.1\(2\)su1
cisco unified_communications_manager 6.1\(2\)su1a
cisco unified_communications_manager 6.1\(3\)
cisco unified_communications_manager 6.1\(4\)
cisco unified_communications_manager 6.1.0
cisco unified_communications_manager 7.0
cisco unified_communications_manager 7.0\(1\)
cisco unified_communications_manager 7.0\(2\)
cisco unified_communications_manager 7.1
cisco unified_communications_manager 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E29A61E-334B-4F95-9B47-8F53A4DB3EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr.5:*:*:*:*:*:*",
              "matchCriteriaId": "FBE07ABF-97B2-48B4-8EF6-861AB41340F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr4:*:*:*:*:*:*",
              "matchCriteriaId": "9135D3DE-5110-47CB-A23F-7CE3D9AFD153",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5:*:*:*:*:*:*",
              "matchCriteriaId": "914A2B2A-6292-451B-B26A-1B529CECBE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5b:*:*:*:*:*:*",
              "matchCriteriaId": "72FAE8F7-504A-4B6F-9C9D-45158AC6C208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5c:*:*:*:*:*:*",
              "matchCriteriaId": "835DD627-C5F1-4733-8949-C91592EC719A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0467A78A-8449-4012-BD80-86BAF8376B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "363E750B-4BC1-4A4B-8440-1617BEF9D8A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44AB103-60E6-4FAF-BD7C-54365E30C88A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2\\(3\\)sr.2:*:*:*:*:*:*",
              "matchCriteriaId": "701A374B-00A7-4151-8652-9A39FAECBC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr2b:*:*:*:*:*:*",
              "matchCriteriaId": "42F41FF1-3FD1-4E90-877C-AC10D56CFEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr3:*:*:*:*:*:*",
              "matchCriteriaId": "291CFDEC-CDF8-438D-9D1E-2832CE705FB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E094AB-5F10-4238-BBE3-236B7306C995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2496F01D-E387-48CD-B586-826D284BBC2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5955E35-E200-4054-8757-39BD04F13220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3_sr3:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FCD7DD-A979-4B35-8C9C-5DAA340D2AEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19432E5E-EA68-4B7A-8B99-DEBACBC3F160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABE4CD8E-F27C-4F96-B955-FC1E71B5D55B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E837527C-D5FA-479F-A61B-8667972FC594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_2:*:*:*:*:*:*:*",
              "matchCriteriaId": "488023AF-EA56-40E2-9A23-61EA758180D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E1D151-8031-447A-9CB9-871599404339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C48DC30-8F7D-4448-9C42-3CBC25053C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:4.3\\(1\\)sr.1:*:*:*:*:*:*",
              "matchCriteriaId": "25EF5BF5-5909-4194-96DD-E8725BD3499A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1DEC3B-2782-4144-9651-73116294765D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\)sr.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0BB09252-6C59-4E1C-93C8-0AC3ED54A294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\)sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA0F270A-F953-43C7-9358-3B237B355BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DCCDC7F-5326-4B6B-9B6F-DAD43E51CD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F524EFB-C076-4EA2-8BF7-9A1B21036CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DF1139-A161-48DD-9929-F6939D626461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:\\(1a\\):*:*:*:*:*:*",
              "matchCriteriaId": "8E8F77F9-05C3-4B66-9022-7B227F97978C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "48A8EE9A-458D-4619-B04D-F01A9934DC11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3EB2A0-6907-4260-BBF1-D8E6E40827FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2597F4-9B5B-4E2E-8DA5-40D769CC57B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F3870B-5DE9-4E3E-BEA7-863916DD45DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2564A8-5805-46E0-B6EC-F4967D67C566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0907FAF-8334-42C1-B35A-EC6ED89AC110",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB47159-FA07-4317-B562-D7AB7C49E8F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77979322-F060-4DD4-A6F2-B1157664C0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "248E4608-B870-4913-8048-3771685CBD77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x before 4.3(2)SR2, 6.x before 6.1(5), 7.x before 7.1(3a)su1, and 8.x before 8.0(1) allows remote attackers to cause a denial of service (process failure) via a malformed SCCP StationCapabilitiesRes message with an invalid MaxCap field, aka Bug ID CSCtc38985."
    },
    {
      "lang": "es",
      "value": "Cisco Unified Communications Manager (tambien conocido como CUCM, anteriormente CallManager) v4.x anteriores a v4.3(2)SR2, v6.x anteriores a v6.1(5), v7.x anteriores a v7.1(3a)su1, y v8.x anteriores a v8.0(1) permite a atacantes remotos producir una denegaci\u00f3n de servicio (fallo de proceso) a trav\u00e9s de un mensaje SCCP StationCapabilitiesRes, con un campo MaxCap invalido, tambi\u00e9n conocido como Bug ID CSCtc38985."
    }
  ],
  "evaluatorImpact": "Per:http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml\r\n\r\nThe following products are affected by vulnerabilities that are described in this advisory:\r\n\r\n    * Cisco Unified Communications Manager 4.x\r\n    * Cisco Unified Communications Manager 5.x\r\n    * Cisco Unified Communications Manager 6.x\r\n    * Cisco Unified Communications Manager 7.x",
  "id": "CVE-2010-0587",
  "lastModified": "2024-11-21T01:12:30.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-05T16:30:00.740",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1023670"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/38496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38496"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.