ID

VAR-200702-0472


CVE

CVE-2007-1072


TITLE

Cisco Unified IP Phone 7906G Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-001605

DESCRIPTION

The command line interface (CLI) in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier allows local users to obtain privileges or cause a denial of service via unspecified vectors. NOTE: this issue can be leveraged remotely via CVE-2007-1063. The problem is CVE-2007-1063 It is a problem that can be attacked remotely via.Authorization and denial of service by local user (DoS) There is a possibility of being put into a state. Unified Ip Phone 7970G is prone to a denial-of-service vulnerability. The CLI in several Cisco products is vulnerable to permissions and access control issues. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco Unified IP Conference Station / IP Phone Default Accounts SECUNIA ADVISORY ID: SA24262 VERIFY ADVISORY: http://secunia.com/advisories/24262/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From local network OPERATING SYSTEM: Cisco Unified IP Conference Station 7936 http://secunia.com/product/13540/ Cisco Unified IP Conference Station 7935 http://secunia.com/product/13541/ Cisco Unified IP Phones 7900 Series http://secunia.com/product/13543/ DESCRIPTION: Some security issues have been reported in Cisco Unified IP Conference Station and IP Phones, which can be exploited by malicious people to access a vulnerable device. 1) A design error in way the administrative HTTP interface of Cisco Unified IP Conference Station handles the state of administrator login sessions can be exploited to bypass the user authentication by accessing management URLs directly. SOLUTION: Update to a fixed version (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Christian Reichert, Christian Blum, and Jens Link of Intact Integrated Services. 2) Reported by the vendor. ORIGINAL ADVISORY: Cisco Systems: http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-1072 // JVNDB: JVNDB-2007-001605 // BID: 81909 // VULHUB: VHN-24434 // PACKETSTORM: 54564

AFFECTED PRODUCTS

vendor:ciscomodel:unified ip phone 7961gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7911gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7970gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7906gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7971gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7941gscope:eqversion:8.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified ip phone 7911gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7941gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7961gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7970gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7906gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:unified ip phone 7971gscope:lteversion:firmware 8.0(4)sr1

Trust: 0.8

vendor:ciscomodel:skinny client control protocol softwarescope:eqversion:8.0\(4\)

Trust: 0.6

sources: JVNDB: JVNDB-2007-001605 // CNNVD: CNNVD-200702-444 // NVD: CVE-2007-1072

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1072
value: HIGH

Trust: 1.0

NVD: CVE-2007-1072
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-444
value: HIGH

Trust: 0.6

VULHUB: VHN-24434
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-1072
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24434
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24434 // JVNDB: JVNDB-2007-001605 // CNNVD: CNNVD-200702-444 // NVD: CVE-2007-1072

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.1

sources: VULHUB: VHN-24434 // NVD: CVE-2007-1072

THREAT TYPE

local

Trust: 0.9

sources: BID: 81909 // CNNVD: CNNVD-200702-444

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-200702-444

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001605

PATCH

title:cisco-sa-20070221-phoneurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070221-phone

Trust: 0.8

sources: JVNDB: JVNDB-2007-001605

EXTERNAL IDS

db:NVDid:CVE-2007-1072

Trust: 2.8

db:BIDid:22647

Trust: 2.0

db:SECUNIAid:24262

Trust: 1.8

db:OSVDBid:33064

Trust: 1.7

db:JVNDBid:JVNDB-2007-001605

Trust: 0.8

db:CNNVDid:CNNVD-200702-444

Trust: 0.7

db:BIDid:81909

Trust: 0.4

db:VULHUBid:VHN-24434

Trust: 0.1

db:PACKETSTORMid:54564

Trust: 0.1

sources: VULHUB: VHN-24434 // BID: 81909 // JVNDB: JVNDB-2007-001605 // PACKETSTORM: 54564 // CNNVD: CNNVD-200702-444 // NVD: CVE-2007-1072

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml

Trust: 2.1

url:http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml

Trust: 2.1

url:http://www.securityfocus.com/bid/22647

Trust: 2.0

url:http://osvdb.org/33064

Trust: 1.7

url:http://secunia.com/advisories/24262

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1072

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1072

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13540/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/24262/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13541/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/13543/

Trust: 0.1

sources: VULHUB: VHN-24434 // BID: 81909 // JVNDB: JVNDB-2007-001605 // PACKETSTORM: 54564 // CNNVD: CNNVD-200702-444 // NVD: CVE-2007-1072

CREDITS

Christian ReichertChristian BlumJens Link

Trust: 0.6

sources: CNNVD: CNNVD-200702-444

SOURCES

db:VULHUBid:VHN-24434
db:BIDid:81909
db:JVNDBid:JVNDB-2007-001605
db:PACKETSTORMid:54564
db:CNNVDid:CNNVD-200702-444
db:NVDid:CVE-2007-1072

LAST UPDATE DATE

2024-11-23T22:28:22.019000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24434date:2019-05-23T00:00:00
db:BIDid:81909date:2007-02-22T00:00:00
db:JVNDBid:JVNDB-2007-001605date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200702-444date:2019-05-27T00:00:00
db:NVDid:CVE-2007-1072date:2024-11-21T00:27:26.497

SOURCES RELEASE DATE

db:VULHUBid:VHN-24434date:2007-02-22T00:00:00
db:BIDid:81909date:2007-02-22T00:00:00
db:JVNDBid:JVNDB-2007-001605date:2012-06-26T00:00:00
db:PACKETSTORMid:54564date:2007-02-23T02:32:16
db:CNNVDid:CNNVD-200702-444date:2007-02-22T00:00:00
db:NVDid:CVE-2007-1072date:2007-02-22T22:28:00