2 results (0.003 seconds)

CVSS: 10.0EPSS: 2%CPEs: 21EXPL: 0

A vulnerability in a proprietary device driver in the kernel of Cisco TelePresence Multipoint Control Unit (MCU) Software could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. The vulnerability is due to improper size validation when reassembling fragmented IPv4 or IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv4 or IPv6 fragments to a port receiving content in Passthrough content mode. An exploit could allow the attacker to overflow a buffer. If successful, the attacker could execute arbitrary code or cause a DoS condition on the affected system. • http://www.securityfocus.com/bid/95787 http://www.securitytracker.com/id/1037698 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-telepresence • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 33EXPL: 0

The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. La tarjeta DSP de los dispositivos Cisco TelePresence MCU 4500 y 4501 antes de v4.3(2.30), dispositivos TelePresence MCU MSE 8510 dispositivos antes de v4.3(2.30), y TelePresence Server antes de v2.3(1.55) no valida correctamente los datos de H.264, que permite a atacantes remotos provocar una denegación de servicio (recarga dispositivo) a través de paquetes hechos a RTP en una (1) sesión de SIP o (2) la sesión H.323, también conocido como Bug ID CSCuc11328 y CSCub05448. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi • CWE-20: Improper Input Validation •