You are here
Home > Preporuke > Ranjivost Cisco Unified CVP sustava

Ranjivost Cisco Unified CVP sustava

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Unified Customer Voice Portal Denial of Service Vulnerability

Advisory ID: cisco-sa-20180117-cvp

Revision: 1.0

For Public Release: 2018 January 17 16:00 GMT

Last Updated: 2018 January 17 16:00 GMT

CVE ID(s): CVE-2018-0086

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in the application server of the Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device.

The vulnerability is due to malformed SIP INVITE traffic received on the CVP during communications with the Cisco Virtualized Voice Browser (VVB). An attacker could exploit this vulnerability by sending malformed SIP INVITE traffic to the targeted appliance. An exploit could allow the attacker to impact the availability of services and data on the device, causing a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cvp [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-cvp”]

—–BEGIN PGP SIGNATURE—–
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=gqZZ
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostatak programske biblioteke eglibc

Otkriven je sigurnosni nedostatak u programskoj biblioteci eglibc za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim lokalnim napadačima omogućuje izvršavanje proizvoljnog...

Close