var-201902-0444
Vulnerability from variot
A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected. An attacker can exploit this issue to restart the affected system, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvn12248
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0444", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "meeting server", "scope": "lt", "trust": 1.8, "vendor": "cisco", "version": "2.3.9" }, { "model": "meeting server", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "2.3.0" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.7" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.4" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.3" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3.1" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.13" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.12" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.11" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.10" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.9" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.6" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.5" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.4" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.3" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.2" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.1" }, { "model": "meeting server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.3" }, { "model": "meeting server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.3.9" }, { "model": "meeting server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.2.14" } ], "sources": [ { "db": "BID", "id": "106909" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:meeting_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001741" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco,This vulnerability was found during the resolution of a Cisco TAC support case.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-295" } ], "trust": 0.6 }, "cve": "CVE-2019-1676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-1676", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-148938", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-1676", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2019-1676", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-1676", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1676", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-1676", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201902-295", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-148938", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-148938" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "CNNVD", "id": "CNNVD-201902-295" }, { "db": "NVD", "id": "CVE-2019-1676" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected. \nAn attacker can exploit this issue to restart the affected system, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCvn12248", "sources": [ { "db": "NVD", "id": "CVE-2019-1676" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "BID", "id": "106909" }, { "db": "VULHUB", "id": "VHN-148938" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1676", "trust": 2.8 }, { "db": "BID", "id": "106909", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-001741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201902-295", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-148938", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148938" }, { "db": "BID", "id": "106909" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "CNNVD", "id": "CNNVD-201902-295" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "id": "VAR-201902-0444", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-148938" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:55:37.379000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190206-meeting-sipdos", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos" }, { "title": "Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89105" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "CNNVD", "id": "CNNVD-201902-295" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148938" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/106909" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190206-meeting-sipdos" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1676" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1676" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-148938" }, { "db": "BID", "id": "106909" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "CNNVD", "id": "CNNVD-201902-295" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-148938" }, { "db": "BID", "id": "106909" }, { "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "db": "CNNVD", "id": "CNNVD-201902-295" }, { "db": "NVD", "id": "CVE-2019-1676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-08T00:00:00", "db": "VULHUB", "id": "VHN-148938" }, { "date": "2019-02-06T00:00:00", "db": "BID", "id": "106909" }, { "date": "2019-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "date": "2019-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-295" }, { "date": "2019-02-08T18:29:00.347000", "db": "NVD", "id": "CVE-2019-1676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-148938" }, { "date": "2019-02-06T00:00:00", "db": "BID", "id": "106909" }, { "date": "2019-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001741" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-295" }, { "date": "2019-10-09T23:47:41.830000", "db": "NVD", "id": "CVE-2019-1676" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-295" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Meeting Server Software input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-295" } ], "trust": 0.6 } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.