fkie_cve-2011-2577
Vulnerability from fkie_nvd
Published
2011-08-31 23:55
Modified
2024-11-21 01:28
Severity ?
Summary
Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_codec_c40:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5E2223-2180-4D0F-9E34-8AF54DC97FE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_codec_c60:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "001596FF-7961-4983-8E1B-E272C94958EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_codec_c90:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC21F7C-240C-446E-BDF6-3E1AB9B05B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_ex60:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6817FE7D-7326-48A4-B0D4-82D086A59789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_ex90:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5666DD-9D12-4B3F-8E36-E86A74FD63CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A0C0F89-EB02-44F7-8C5B-5F1BB6F7B78E",
              "versionEndIncluding": "tc3.1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50105F72-7662-4501-A636-12B0CA39F3AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC54B18-A85D-4E7D-92EA-E41B7BBFE674",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE78B49E-437A-4152-A900-A4970820B651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "60241812-BAAA-4B09-8081-0E56E3F17D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_c_series_software:tc3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB09627-26D5-44AE-9A25-3B6FF42DB4BC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_6000_mxp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "059AF6E3-0E8A-4C80-85D2-92E4F6C1148F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_9000_mxp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33339F8B-49B8-4601-974B-25954B13DFD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DE1AE6C-A4A2-4B30-908C-B762C7FF3731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C323D0-15A4-4639-9DDC-513BD7EEC5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30A62F0-46F1-4F5E-9359-034609462F37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_mxp_software:f9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E634F54-2913-4BAD-A6C6-93A0043A6253",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:telepresence_e20:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4723AA-DB31-4528-9B0E-DA89A0A48EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:telepresence_e20_software:te2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F1890CD-A9DE-426A-9769-BD69D38C38AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en TelePresence C Series Endpoints de Cisco, unidades E/EX Personal Video, y MXP Series Codecs, cuando se utilizan las versiones de software anterior a versiones 4.0.0 o F9.1 del TC, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de un paquete SIP dise\u00f1ado al puerto 5060 o 5061, tambi\u00e9n se conoce como Bug ID CSCtq46500."
    }
  ],
  "id": "CVE-2011-2577",
  "lastModified": "2024-11-21T01:28:31.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-31T23:55:03.300",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://securityreason.com/securityalert/8387"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securityreason.com/securityalert/8389"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17871"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/49392"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1025994"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b91395.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/17871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/519698/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/49392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69513"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.