ID

VAR-200501-0320


CVE

CVE-2005-0186


TITLE

Cisco IOS embedded call processing solutions contain unspecified DoS vulnerability

Trust: 0.8

sources: CERT/CC: VU#613384

DESCRIPTION

Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port. Cisco IOS Implemented in ITS , CME ,and SRST Is SCCP Packets are not processed properly, so if these are enabled, illegal SCCP A vulnerability exists that causes the device to restart after interpreting the packet.System disrupts service operation (DoS) It may be in a state. IOS is prone to a denial-of-service vulnerability. The issue is reported to exist in the Skinny Call Control Protocol (SCCP) handler. A remote attacker may exploit this vulnerability continuously to effectively deny network-based services to legitimate users. Cisco IOS is the underlying operating system for Cisco networking equipment

Trust: 2.97

sources: NVD: CVE-2005-0186 // CERT/CC: VU#613384 // JVNDB: JVNDB-2005-000044 // BID: 90292 // BID: 12307 // VULHUB: VHN-11395

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 3.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1yd

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yescope: - version: -

Trust: 0.3

sources: CERT/CC: VU#613384 // BID: 90292 // BID: 12307 // JVNDB: JVNDB-2005-000044 // CNNVD: CNNVD-200501-257 // NVD: CVE-2005-0186

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0186
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#613384
value: 9.45

Trust: 0.8

NVD: CVE-2005-0186
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200501-257
value: MEDIUM

Trust: 0.6

VULHUB: VHN-11395
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-0186
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-11395
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#613384 // VULHUB: VHN-11395 // JVNDB: JVNDB-2005-000044 // CNNVD: CNNVD-200501-257 // NVD: CVE-2005-0186

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0186

THREAT TYPE

network

Trust: 0.6

sources: BID: 90292 // BID: 12307

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200501-257

CONFIGURATIONS

sources: JVNDB: JVNDB-2005-000044

PATCH

title:cisco-sa-20050119-itscmeurl:http://www.cisco.com/warp/public/707/cisco-sa-20050119-itscme.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2005-000044

EXTERNAL IDS

db:SECUNIAid:13913

Trust: 3.3

db:NVDid:CVE-2005-0186

Trust: 2.8

db:SECTRACKid:1012945

Trust: 2.0

db:CERT/CCid:VU#613384

Trust: 1.6

db:BIDid:12307

Trust: 1.1

db:XFid:18956

Trust: 0.9

db:JVNDBid:JVNDB-2005-000044

Trust: 0.8

db:CNNVDid:CNNVD-200501-257

Trust: 0.7

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:4849

Trust: 0.6

db:CISCOid:20050119 VULNERABILITY IN CISCO IOS EMBEDDED CALL PROCESSING SOLUTIONS

Trust: 0.6

db:BIDid:90292

Trust: 0.4

db:VULHUBid:VHN-11395

Trust: 0.1

sources: CERT/CC: VU#613384 // VULHUB: VHN-11395 // BID: 90292 // BID: 12307 // JVNDB: JVNDB-2005-000044 // CNNVD: CNNVD-200501-257 // NVD: CVE-2005-0186

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20050119-itscme.shtml

Trust: 2.8

url:http://securitytracker.com/id?1012945

Trust: 2.0

url:http://secunia.com/advisories/13913

Trust: 1.7

url:http://secunia.com/advisories/13913/

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a4849

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/18956

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/18956

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0186

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0186

Trust: 0.8

url:http://www.securityfocus.com/bid/12307

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/613384

Trust: 0.8

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:4849

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00803b3fff.shtml

Trust: 0.3

sources: CERT/CC: VU#613384 // VULHUB: VHN-11395 // BID: 90292 // BID: 12307 // JVNDB: JVNDB-2005-000044 // CNNVD: CNNVD-200501-257 // NVD: CVE-2005-0186

CREDITS

Unknown

Trust: 0.3

sources: BID: 90292

SOURCES

db:CERT/CCid:VU#613384
db:VULHUBid:VHN-11395
db:BIDid:90292
db:BIDid:12307
db:JVNDBid:JVNDB-2005-000044
db:CNNVDid:CNNVD-200501-257
db:NVDid:CVE-2005-0186

LAST UPDATE DATE

2024-08-14T13:51:11.969000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#613384date:2005-01-21T00:00:00
db:VULHUBid:VHN-11395date:2017-10-11T00:00:00
db:BIDid:90292date:2005-01-19T00:00:00
db:BIDid:12307date:2005-01-19T00:00:00
db:JVNDBid:JVNDB-2005-000044date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200501-257date:2009-03-04T00:00:00
db:NVDid:CVE-2005-0186date:2017-10-11T01:29:53.013

SOURCES RELEASE DATE

db:CERT/CCid:VU#613384date:2005-01-21T00:00:00
db:VULHUBid:VHN-11395date:2005-01-19T00:00:00
db:BIDid:90292date:2005-01-19T00:00:00
db:BIDid:12307date:2005-01-19T00:00:00
db:JVNDBid:JVNDB-2005-000044date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200501-257date:2005-01-19T00:00:00
db:NVDid:CVE-2005-0186date:2005-01-19T05:00:00