2 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 0

A vulnerability in the handling of IP fragments for the Cisco Small Business SPA300, SPA500, and SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to the inability to handle many large IP fragments for reassembly in a short duration. An attacker could exploit this vulnerability by sending a crafted stream of IP fragments to the targeted device. An exploit could allow the attacker to cause a DoS condition when the device unexpectedly reloads. Cisco Bug IDs: CSCve82586. • http://www.securityfocus.com/bid/100926 http://www.securitytracker.com/id/1039413 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-spa • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 0

The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400. La implementación TFTP en teléfonos Cisco Small Business SPA30x, SPA50x, SPA51x 7.5.7 no valida adecuadamente la integridad del archivo de imagen de firmware, lo que permite a usuarios locales cargar una imagen de un Troyano mediante el aprovechamiento de acceso shell, también conocido como Bug ID CSCut67400. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp http://www.securityfocus.com/bid/78739 http://www.securitytracker.com/id/1034376 • CWE-20: Improper Input Validation •