fkie_cve-2012-0367
Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2024-11-21 01:34
Severity ?
Summary
Cisco Unity Connection before 7.1.5b(Su5), 8.0 and 8.5 before 8.5.1(Su3), and 8.6 before 8.6.2 allows remote attackers to cause a denial of service (services crash) via a series of crafted TCP segments, aka Bug ID CSCtq67899.
Impacted products
Vendor Product Version
cisco unity_connection *
cisco unity_connection 1.1
cisco unity_connection 1.1\(1\)
cisco unity_connection 1.1\(1\)_es1
cisco unity_connection 1.1\(1\)_es12
cisco unity_connection 1.1\(1\)_sr1
cisco unity_connection 1.2
cisco unity_connection 1.2\(1\)
cisco unity_connection 1.2\(1\)_es65
cisco unity_connection 1.2\(1\)sr2
cisco unity_connection 2.0
cisco unity_connection 2.0\(1\)
cisco unity_connection 2.1
cisco unity_connection 2.1\(1\)
cisco unity_connection 2.1\(2\)
cisco unity_connection 2.1\(3\)
cisco unity_connection 2.1\(3b\)su1
cisco unity_connection 2.1\(4\)
cisco unity_connection 2.1\(4\)su1
cisco unity_connection 2.1\(4a\)
cisco unity_connection 2.1\(4a\)su2
cisco unity_connection 2.1\(5\)
cisco unity_connection 2.1\(5\)su1
cisco unity_connection 2.1\(5\)su2
cisco unity_connection 2.1\(5\)su3
cisco unity_connection 6.1\(3b\)su1
cisco unity_connection 7.0
cisco unity_connection 7.0\(2\)
cisco unity_connection 7.0\(2a\)su2
cisco unity_connection 7.0\(2a\)su3
cisco unity_connection 7.1
cisco unity_connection 7.1\(2\)
cisco unity_connection 7.1\(2a\)
cisco unity_connection 7.1\(2a\)su1
cisco unity_connection 7.1\(2b\)
cisco unity_connection 7.1\(2b\)su1
cisco unity_connection 7.1\(3\)
cisco unity_connection 7.1\(3a\)
cisco unity_connection 7.1\(3a\)su1
cisco unity_connection 7.1\(3a\)su1a
cisco unity_connection 7.1\(3b\)
cisco unity_connection 7.1\(3b\)su1
cisco unity_connection 7.1\(3b\)su2
cisco unity_connection 7.1\(5\)
cisco unity_connection 7.1\(5\)su1a
cisco unity_connection 7.1\(5a\)
cisco unity_connection 7.1\(5b\)
cisco unity_connection 7.1\(5b\)su2
cisco unity_connection 7.1\(5b\)su3
cisco unity_connection 8.0
cisco unity_connection 8.0\(2c\)
cisco unity_connection 8.0\(2c\)su1
cisco unity_connection 8.0\(3\)
cisco unity_connection 8.0\(3a\)
cisco unity_connection 8.0\(3a\)su1
cisco unity_connection 8.0\(3a\)su2
cisco unity_connection 8.0\(3a\)su3
cisco unity_connection 8.5
cisco unity_connection 8.5\(1\)
cisco unity_connection 8.5\(1\)su1
cisco unity_connection 8.5\(1\)su2
cisco unity_connection 8.6
cisco unity_connection 8.6\(1a\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "80CB6942-7578-4A68-99CC-C34E36F04C62",
              "versionEndIncluding": "7.1\\(5b\\)su4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3AE997-4D63-4CFE-BF22-7221EC9B2450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2541F3D6-BD69-47D6-8070-DDCEDEE7F497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_es1:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B4F97A-170A-4ADD-B7E7-FBA25CF75608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_es12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAB8EB6D-5220-42B0-B03B-6C469DA11412",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\)_sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FBA8D2F-E052-41F8-B789-FD108680CB2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC2AB24-3EA7-418D-A6C7-3E117D5D9CB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CA4EE9E7-FA5C-4EBF-82E7-96BA070A5864",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\)_es65:*:*:*:*:*:*:*",
              "matchCriteriaId": "3493411D-57F7-44E7-9B86-8FC6CF816A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:1.2\\(1\\)sr2:*:*:*:*:*:*:*",
              "matchCriteriaId": "06FF8F62-7D97-4763-BF47-F90C1E061CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457A6420-D5B3-44D8-8E0C-48F2D83BD978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BCD675A5-D5FD-464A-8DBA-69687609913D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "055C8F15-64A3-42B9-8744-C8CDA6D15203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "46FBE411-C945-4800-AA5B-A2BB0CE02EA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B355503F-8484-47CA-8A82-6B2903FFBBC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "309EC45A-5DFA-40EF-8BBC-151E202C3753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(3b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65F5A4C-5A5D-4B58-8D66-D26F72CAB5AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E685D1A6-309E-4E25-995D-98057100B31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(4\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10F6C433-DD59-4639-8D19-380BF7943661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(4a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB9AF3B-7721-4514-BEEF-A6414BBC4442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(4a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "941E4D43-3DE4-4F6A-8BC9-A2DC14C645D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "22087C01-F009-43D6-AEA0-246DACCA5947",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "950E8D14-CF22-4D8C-A28E-E99FD2F13508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CAF193-B287-482B-A62B-ADC39B9E1C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:2.1\\(5\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "598BD90A-E0A2-488B-830A-9D6E61F996F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:6.1\\(3b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6A8F36-1B43-4034-BECF-9F5023EE9544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE719821-4902-48A6-9E07-D1E93CE2A498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DD637040-DE0E-4363-872C-3AD574DD511F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.0\\(2a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07DA14B8-F197-42C4-B82B-4C70E0E34DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.0\\(2a\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "51400F37-A6F6-43CA-BEC5-5F8E289CB633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00DC7204-2E62-441B-A432-3B33224680AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B52ADDA2-D366-474C-AE65-83998FED89F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6CBE0184-2D1B-4DA2-B1B6-59B3E013557A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C6DED4-9D0D-4FE3-BC94-BE1B6CBCCB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBF4DF8-EA6E-4160-918C-8938188E22E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0591D082-7290-476D-A0B8-DEA649AE661D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB1C1C9-5F1A-40F7-BEB0-66B1793C538C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B69719BD-D624-479A-BF75-04A6D1691585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "851E3C54-848C-4D6A-AC2E-9FADC3377377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C04291-80AC-4804-86DE-D7D5653F3824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFC6E1B0-2BEB-45C1-90F5-F79D1FBC714A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F18323-F108-4816-8AC5-F8CBADCDB06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE18C174-CFDF-48E9-B46B-696BDCF6F02E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE964E1-0A54-49C4-A1EC-5707DBADC4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\)su1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0610189-1E2D-4CED-AB12-E80E7F9F1930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E56D2B86-DAC0-4E3C-A13C-4908D4312487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7026853F-6467-41C8-AE31-B8742D230473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB6DB1C-9493-4FE6-BBED-11C5B0BDCAE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "286C8ECF-BFEB-41BD-8286-595B27AB5CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF499CAD-B9DA-4844-88E6-C69AC4CABDA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(2c\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A29645C2-1A91-4F99-992E-43FDDA34AFFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(2c\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A7C0D6-BD4E-4418-ACF1-055D7A9A02DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC68BC79-1DF6-490D-BAC1-EE9848EABC99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(3a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "DBDDAD62-A2E4-40AC-A21C-2F721EA1C84F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(3a\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3263EA4-4C62-49DA-8C5B-892E9610CD53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(3a\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "511E975C-AEF5-4D03-9930-3A37E3A7F555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.0\\(3a\\)su3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9757B9BA-922D-465C-9C8D-81FAA8A0E950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC115AC-8AB7-4AEF-A343-F55A190AFF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "101FCDD0-DC91-4111-975E-DE618D3B4E9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386D8CD-D6EA-4705-ABDC-EA6558F5AC30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4B1917B-197C-4E28-9356-2ACC4C4DB932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C504A3-5B4C-4230-97A9-B3CCDA0CBD31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C40F61A6-A992-4DA4-9730-D145055596C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unity Connection before 7.1.5b(Su5), 8.0 and 8.5 before 8.5.1(Su3), and 8.6 before 8.6.2 allows remote attackers to cause a denial of service (services crash) via a series of crafted TCP segments, aka Bug ID CSCtq67899."
    },
    {
      "lang": "es",
      "value": "Cisco Unity Connection anteriores a v7.1.5b(Su5), v8.0 y 8.5 anteriores a v8.5.1(Su3), y v8.6 anteriores a v8.6.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de servicios) a trav\u00e9s de una serie de segmentos TCP manipulados, tambi\u00e9n conocido como Bug ID CSCtq67899."
    }
  ],
  "id": "CVE-2012-0367",
  "lastModified": "2024-11-21T01:34:51.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:01.050",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.