fkie_cve-2011-4487
Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2024-11-21 01:32
Severity ?
Summary
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) with software 6.x and 7.x before 7.1(5b)su5, 8.0 before 8.0(3a)su3, and 8.5 and 8.6 before 8.6(2a)su1 and Cisco Business Edition 3000 with software before 8.6.3 and 5000 and 6000 with software before 8.6(2a)su1 allows remote attackers to execute arbitrary SQL commands via a crafted SCCP registration, aka Bug ID CSCtu73538.
Impacted products
Vendor Product Version
cisco unified_communications_manager 6.0
cisco unified_communications_manager 6.0\(1\)
cisco unified_communications_manager 6.0\(1a\)
cisco unified_communications_manager 6.0\(1b\)
cisco unified_communications_manager 6.1\(1\)
cisco unified_communications_manager 6.1\(1a\)
cisco unified_communications_manager 6.1\(1b\)
cisco unified_communications_manager 6.1\(2\)
cisco unified_communications_manager 6.1\(2\)su1
cisco unified_communications_manager 6.1\(2\)su1a
cisco unified_communications_manager 6.1\(3\)
cisco unified_communications_manager 6.1\(3a\)
cisco unified_communications_manager 6.1\(3b\)
cisco unified_communications_manager 6.1\(3b\)su1
cisco unified_communications_manager 6.1\(4\)
cisco unified_communications_manager 6.1\(4\)su1
cisco unified_communications_manager 6.1\(4a\)
cisco unified_communications_manager 6.1\(4a\)su2
cisco unified_communications_manager 6.1\(5\)
cisco unified_communications_manager 6.1\(5\)su1
cisco unified_communications_manager 6.1\(5\)su2
cisco unified_communications_manager 6.1\(5\)su3
cisco unified_communications_manager 7.0\(1\)su1
cisco unified_communications_manager 7.0\(1\)su1a
cisco unified_communications_manager 7.0\(2\)
cisco unified_communications_manager 7.0\(2a\)
cisco unified_communications_manager 7.0\(2a\)su1
cisco unified_communications_manager 7.0\(2a\)su2
cisco unified_communications_manager 7.1\(2a\)
cisco unified_communications_manager 7.1\(2a\)su1
cisco unified_communications_manager 7.1\(2b\)
cisco unified_communications_manager 7.1\(2b\)su1
cisco unified_communications_manager 7.1\(3\)
cisco unified_communications_manager 7.1\(3a\)
cisco unified_communications_manager 7.1\(3a\)su1
cisco unified_communications_manager 7.1\(3a\)su1a
cisco unified_communications_manager 7.1\(3b\)
cisco unified_communications_manager 7.1\(3b\)su1
cisco unified_communications_manager 7.1\(3b\)su2
cisco unified_communications_manager 7.1\(5\)
cisco unified_communications_manager 7.1\(5\)su1
cisco unified_communications_manager 7.1\(5\)su1a
cisco unified_communications_manager 7.1\(5a\)
cisco unified_communications_manager 7.1\(5b\)
cisco unified_communications_manager 7.1\(5b\)su1
cisco unified_communications_manager 7.1\(5b\)su1a
cisco unified_communications_manager 7.1\(5b\)su2
cisco unified_communications_manager 7.1\(5b\)su3
cisco unified_communications_manager 7.1\(5b\)su4
cisco unified_communications_manager 8.0
cisco unified_communications_manager 8.0\(1\)
cisco unified_communications_manager 8.0\(2\)
cisco unified_communications_manager 8.0\(2a\)
cisco unified_communications_manager 8.0\(2b\)
cisco unified_communications_manager 8.0\(2c\)
cisco unified_communications_manager 8.0\(2c\)su1
cisco unified_communications_manager 8.0\(3\)
cisco unified_communications_manager 8.0\(3a\)
cisco unified_communications_manager 8.0\(3a\)su1
cisco unified_communications_manager 8.0\(3a\)su2
cisco unified_communications_manager 8.5
cisco unified_communications_manager 8.5\(1\)
cisco unified_communications_manager 8.5\(1\)su1
cisco unified_communications_manager 8.5\(1\)su2
cisco unified_communications_manager 8.5\(1\)su3
cisco unified_communications_manager 8.6
cisco unified_communications_manager 8.6\(1\)
cisco unified_communications_manager 8.6\(1a\)
cisco unified_communications_manager 8.6\(2\)
cisco unified_communications_manager 8.6\(2a\)
cisco business_edition_3000_software 8.6\(1\)
cisco business_edition_3000_software 8.6\(1a\)
cisco business_edition_3000_software 8.6\(2a\)
cisco business_edition_3000_software 8.6.2
cisco business_edition_3000 -
cisco business_edition_5000_software 8.5
cisco business_edition_5000_software 8.5\(1\)
cisco business_edition_5000_software 8.6
cisco business_edition_5000_software 8.6\(1\)
cisco business_edition_5000_software 8.6\(1a\)
cisco business_edition_5000_software 8.6\(2\)
cisco business_edition_5000_software 8.6\(2a\)
cisco business_edition_5000 -
cisco business_edition_6000_software 8.5\(1\)
cisco business_edition_6000_software 8.5\(1\)su1
cisco business_edition_6000_software 8.5\(1\)su2
cisco business_edition_6000_software 8.5\(1\)su3
cisco business_edition_6000_software 8.5\(1-2011o\)
cisco business_edition_6000_software 8.6\(1\)
cisco business_edition_6000_software 8.6\(1a\)
cisco business_edition_6000_software 8.6\(2\)
cisco business_edition_6000_software 8.6\(2a\)
cisco business_edition_6000 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DF1139-A161-48DD-9929-F6939D626461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CD96CE-AAC6-40BD-A053-A62572AC7714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "48A8EE9A-458D-4619-B04D-F01A9934DC11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3EB2A0-6907-4260-BBF1-D8E6E40827FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "44280E56-C151-4C08-804D-001F91FF2AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BD968A56-9539-4699-9099-0F220D283CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4CEBB9B-2B43-44C2-BC93-55E58C24CED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2597F4-9B5B-4E2E-8DA5-40D769CC57B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "665ACEFC-B989-42AB-BAB4-2C273CF2B702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9ABF04-C732-4509-8589-F58E1D5F66E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D899431-7C91-4CB4-9CBA-D5BA34B7B330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FC13697F-84A3-4793-B82E-6E8857B4FC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC24D57B-3D0C-486D-83CB-A4E419CA9626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5137D0F-0273-41EF-B3F6-2D87662B3788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FCBB8A8-E31C-49A3-843E-F18B2FF134B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C54A10-998C-435F-B058-A6879CD608A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D81D69D5-E669-4DBC-A76B-E9C30A239A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB47159-FA07-4317-B562-D7AB7C49E8F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8765E016-7C6F-4C36-A22C-78ED8666F7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3D5254-3E67-452E-ADB3-204A66765952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D3680AB-CEF8-4C2C-A46B-C9009E6A6590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B591E75E-040C-4D26-AF13-A4F87E048579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F22B2CDE-DB49-402D-8BF2-B9458D907DDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18986D7E-E1E6-46EB-A247-2A98224FC122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAAC2E8-B548-4940-9492-DEAB574E7CF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "46BDD926-7F96-46C5-AD9C-40B7D3C78340",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA63076-B8A1-4672-99F3-703F7838F3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EADE6FA-40F8-4BEB-ABDB-77D4C0E587BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F84676C-75A5-48D2-889D-B48EC724336F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2EA15D48-A0DE-4091-8C78-666E98B488C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3038823F-C32D-4C1B-8228-D14B35535297",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "617E82C3-1CB1-46B2-BCFE-94BF9DBDD1D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECDCE1A-176D-46E0-9C39-19FAD7B57892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6856A2A-55F4-4785-BEC1-54295D7D9CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2727998A-ED1F-4EFE-9952-7DA8486706D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F61FD826-A08E-477C-AA57-359B10387035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9EDB91-350B-4ED4-A177-257023380C44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBA6140-CEF7-4990-9A1E-76F02607BA84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCF2F2A-DF52-4BD8-A56B-B4E91CD1D1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0A5B28-0211-4173-BD91-67BCA3267C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74323C2F-949A-4A97-8A1A-1D0A470B93BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E69A9EC1-7078-4866-986E-D2842CFDC404",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "248E4608-B870-4913-8048-3771685CBD77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "52D7EECA-322E-48E4-9682-6C3C39B64B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "547E3100-EFBF-4F30-8D9E-81F8B79D9F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCE55716-ACB7-411B-B708-415D4DB1D8AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "916C8A47-B3DA-42C0-BE2F-041269F79CF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C09FE52A-E0AF-4B0F-A44E-4362E26A88D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9AD0704-6F85-4E64-88D4-73E8BB2BEF4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "07EF7BE6-2702-4174-A8AA-AFD44014F8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "56403D34-B803-4DA7-96BC-2E0797D27F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64FDCB2A-AAF7-44EF-B748-6B336B7CD2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765921EA-40B6-491F-9F05-85E000F12474",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E1FA195-A711-4861-9B3D-A36D55C0F49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F252947A-82FE-4133-AA4F-E17758D7ECF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F61E277B-475A-40EC-8A67-CE2A17C94185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D289E6D8-EA6A-4487-9513-6CCEE3740EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FAA377E-3C37-4E9D-97E7-FDC162CF8FC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCF00D65-DE88-4287-82CB-552AB68AFE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "47E28290-C7A9-4DF4-9918-6FDF5DC2B3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B5A9DD-C259-463C-A6A5-51D3E8DD4F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6B04ECEA-E097-4069-B6AC-74D477F03BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CCD3E6-6031-437E-862B-470E39FAF67D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D562BA39-A14D-4E9F-AFCB-B9F6859871DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6297C4F7-28D7-4705-AF77-D207BD37CB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_3000_software:8.6\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BF9A73-0E5C-4FBE-9581-7B15D1288BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_3000_software:8.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D63A13EC-E339-4324-BE52-6DCA2C1C5136",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_edition_3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D1D8B5-9747-40DB-A4FE-B540C9097086",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1721C3E6-CAFB-4093-B62B-F702E23E2362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "18CAF185-1FDF-4487-8060-E2A765B2ECE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "410F85BD-D93D-4AD4-B101-F778CD1F292B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B050E02D-EE99-4706-B15B-11DACF119D48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "15D9013B-C4EB-45E3-AFC6-3D92865C2A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "61C1465E-3229-4A72-80E5-C82736021F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_5000_software:8.6\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FD003661-662F-43B1-902B-FB4812919AE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_edition_5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "766F3C0E-B41D-4944-8BBF-3A268C8A75CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "960BE31B-A480-44AF-9D50-9F185B7D16FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "711894D8-6183-429E-9774-248107B359D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF144D24-43D0-44E0-A7B7-4EED333BD4A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9ADE41-37AD-4A0C-A963-66161D000B6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.5\\(1-2011o\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD81820-BCC4-4A66-8B6F-208956DBC466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "57C8BA28-19F0-4143-B274-23C7FE0DC987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8E0F3C-06E5-4078-8A9E-9071AF23A8C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4CD80DFF-ABAA-41F4-B477-109CC4356988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:business_edition_6000_software:8.6\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4F3553-C49E-48DC-97FE-CAD258632CF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_edition_6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03C14962-852B-40A7-ADD9-7983C9A36529",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) with software 6.x and 7.x before 7.1(5b)su5, 8.0 before 8.0(3a)su3, and 8.5 and 8.6 before 8.6(2a)su1 and Cisco Business Edition 3000 with software before 8.6.3 and 5000 and 6000 with software before 8.6(2a)su1 allows remote attackers to execute arbitrary SQL commands via a crafted SCCP registration, aka Bug ID CSCtu73538."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Cisco Unified Communications Manager (CUCM) con software v6.x y v7.x anteriores a v7.1(5b)su5, v8.0 anteriores a v8.0(3a)su3, y v8.5 y v8.6 anteriores a v8.6(2a)su1 y Cisco Business Edition 3000 con software anterior a v8.6.3 y  5000 y 6000 con software anterior a v8.6(2a)su1, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de un registro SCCP manipulado, tambi\u00e9n conocido como Bug ID CSCtu73538."
    }
  ],
  "id": "CVE-2011-4487",
  "lastModified": "2024-11-21T01:32:24.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:00.753",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cucm"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.