var-201305-0113
Vulnerability from variot
Cisco TelePresence Supervisor MSE 8050 before 2.3(1.31) allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing TCP connections at a high rate, aka Bug IDs CSCuf76076 and CSCuf79763. Successfully exploiting this issue may allow an attacker to cause high CPU utilization and reload of the affected system resulting in denial of service conditions. This issue is being tracked by Cisco Bug IDs CSCuf76076 and CSCuf79763
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201305-0113", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "telepresence supervisor mse 8050 software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.2\\(1.17\\)" }, { "model": "telepresence supervisor mse 8050", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "telepresence supervisor mse 8050", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "telepresence supervisor mse 8050 software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "2.3(1.31)" }, { "model": "telepresence supervisor mse 8050 software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.2\\(1.17\\)" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "CNNVD", "id": "CNNVD-201305-303" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:telepresence_supervisor_mse_8050", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:telepresence_supervisor_mse_8050_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002732" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "59879" }, { "db": "CNNVD", "id": "CNNVD-201305-303" } ], "trust": 0.9 }, "cve": "CVE-2013-1236", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2013-1236", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-61238", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-1236", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-1236", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201305-303", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-61238", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-61238" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "CNNVD", "id": "CNNVD-201305-303" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco TelePresence Supervisor MSE 8050 before 2.3(1.31) allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing TCP connections at a high rate, aka Bug IDs CSCuf76076 and CSCuf79763. \nSuccessfully exploiting this issue may allow an attacker to cause high CPU utilization and reload of the affected system resulting in denial of service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCuf76076 and CSCuf79763", "sources": [ { "db": "NVD", "id": "CVE-2013-1236" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "BID", "id": "59879" }, { "db": "VULHUB", "id": "VHN-61238" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1236", "trust": 2.8 }, { "db": "BID", "id": "59879", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2013-002732", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201305-303", "trust": 0.7 }, { "db": "CISCO", "id": "20130515 CISCO TELEPRESENCE SUPERVISOR MSE 8050 DENIAL OF SERVICE VULNERABILITY", "trust": 0.6 }, { "db": "NSFOCUS", "id": "23707", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-61238", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61238" }, { "db": "BID", "id": "59879" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "CNNVD", "id": "CNNVD-201305-303" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "id": "VAR-201305-0113", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-61238" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:02:24.007000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130515-mse", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130515-mse" }, { "title": "29262", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=29262" }, { "title": "cisco-sa-20130515-mse", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/111/1118/1118113_cisco-sa-20130515-mse-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002732" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61238" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130515-mse" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1236" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1236" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/59879" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/23707" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-61238" }, { "db": "BID", "id": "59879" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "CNNVD", "id": "CNNVD-201305-303" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-61238" }, { "db": "BID", "id": "59879" }, { "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "db": "CNNVD", "id": "CNNVD-201305-303" }, { "db": "NVD", "id": "CVE-2013-1236" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-16T00:00:00", "db": "VULHUB", "id": "VHN-61238" }, { "date": "2013-05-15T00:00:00", "db": "BID", "id": "59879" }, { "date": "2013-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "date": "2013-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-303" }, { "date": "2013-05-16T03:36:22.727000", "db": "NVD", "id": "CVE-2013-1236" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-16T00:00:00", "db": "VULHUB", "id": "VHN-61238" }, { "date": "2013-05-15T00:00:00", "db": "BID", "id": "59879" }, { "date": "2013-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002732" }, { "date": "2013-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-303" }, { "date": "2024-11-21T01:49:10.220000", "db": "NVD", "id": "CVE-2013-1236" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco TelePresence Supervisor MSE 8050 Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002732" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-303" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.