Page 10 of 63 results (0.014 seconds)

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x before 4.3(2)SR2, 6.x before 6.1(5), 7.x before 7.1(3a)su1, and 8.x before 8.0(1) allows remote attackers to cause a denial of service (process failure) via a malformed SCCP StationCapabilitiesRes message with an invalid MaxCap field, aka Bug ID CSCtc38985. Cisco Unified Communications Manager (tambien conocido como CUCM, anteriormente CallManager) v4.x anteriores a v4.3(2)SR2, v6.x anteriores a v6.1(5), v7.x anteriores a v7.1(3a)su1, y v8.x anteriores a v8.0(1) permite a atacantes remotos producir una denegación de servicio (fallo de proceso) a través de un mensaje SCCP StationCapabilitiesRes, con un campo MaxCap invalido, también conocido como Bug ID CSCtc38985. • http://securitytracker.com/id?1023670 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1b924.shtml http://www.securityfocus.com/bid/38496 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Cisco Unified Communications Manager (aka CUCM, formerly CallManager) before 6.1(1) allows remote attackers to cause a denial of service (voice-services outage) via a malformed header in a SIP message, aka Bug ID CSCsi46466. Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) anteriores a v6.1(1) permite a los atacantes remotos causar una denegación de servicio (parada servicio de voz) a través de cabeceras malformadas en un mensaje SIP, también conocido como Bug ID CSCsi46466. • http://osvdb.org/57452 http://secunia.com/advisories/36495 http://secunia.com/advisories/36499 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml http://www.securityfocus.com/bid/36152 http://www.securitytracker.com/id?1022775 •

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), 7.0 before 7.0(2a)su1, and 7.1 before 7.1(2a)su1 allows remote attackers to cause a denial of service (file-descriptor exhaustion and SIP outage) via a flood of TCP packets, aka Bug ID CSCsx23689. Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) v4.x, v5.x anteriores a v5.1(3g), v6.x anteriores a v6.1(4), v7.0 anteriores a v7.0(2a)su1, y v7.1 anteriores a v7.1(2a)su1 permite a los atacantes remotos causar una denegación de servicio (agotamiento de la descripción del fichero y parada SIP) a través de una inundación de paquetes TCP, también conocido como Bug ID CSCsx23689. • http://osvdb.org/57456 http://secunia.com/advisories/36498 http://secunia.com/advisories/36499 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml http://www.securityfocus.com/bid/36152 http://www.securitytracker.com/id?1022775 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 9.0EPSS: 0%CPEs: 30EXPL: 0

The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x. La funcionalidad IP Phone Personal Address Book (PAB) Synchronizer en Cisco Unified Communications Manager (también conocido como CUCM, formalmente CallManager) v4.1, v4.2 anteriores v4.2(3)SR4b, v4.3 anteriores v4.3(2)SR1b, v5.x anteriores v5.1(3e), v6.x anteriores v6.1(3), y v7.0 anteriores v7.0(2) envía credenciales de cuentas privilegiadas del servicio directorio a el cliente en texto plano, lo que permite a los atacantes remotos modificar la configuración CUCM y desarrollar otros acciones privilegiadas interceptando estas credenciales, y usándola en peticiones no relativas a las tareas de sincronización establecidas, como se ha demostrado a través de (1) credenciales de la cuenta DC Directory en CUCM v4.x y (2) credenciales de cuenta TabSyncSysUser en CUCM v5.x hasta v7.x. • http://osvdb.org/52589 http://secunia.com/advisories/34238 http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml http://www.securityfocus.com/bid/34082 http://www.securitytracker.com/id?1021839 http://www.vupen.com/english/advisories/2009/0675 https://exchange.xforce.ibmcloud.com/vulnerabilities/49196 • CWE-255: Credentials Management Errors •

CVSS: 7.1EPSS: 1%CPEs: 10EXPL: 0

Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4 and Unified Communications Manager 4.1 through 6.1, when VoIP is configured, allows remote attackers to cause a denial of service (device or process reload) via unspecified valid SIP messages, aka Cisco Bug ID CSCsu38644, a different vulnerability than CVE-2008-3801 and CVE-2008-3802. Vulnerabilidad no especificada en la implementación de la Session Initiation Protocol en Cisco IOS v12.2 a la v12.4 y Unified Communications Manager v4.1 a la v6.1, cuando VoIP está configurada, permite a atacantes remotos provocar una denegación de servicio (reinicio de proceso o de dispositivo) a través de mensajes SIP válidos no especificados, también conocidos como "Cisco Bug ID CSCsu38644". Vulnerabilidad distinta de CVE-2008-3800 y CVE-2008-3802. • http://secunia.com/advisories/31990 http://secunia.com/advisories/32013 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml http://www.securityfocus.com/bid/31367 http://www.securitytracker.com/id?1020939 http://www.securitytracker.com/id?1020942 http://www.vupen.com/english/advisories/2008/2670 http://www.vupen.com/english/advisories/2008/2671 https://oval.cisecurity.org/re •