ID

VAR-200805-0197


CVE

CVE-2008-1158


TITLE

Cisco Unified Presence Engine Service In IP Service disruption due to packets (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-002009

DESCRIPTION

The Presence Engine (PE) service in Cisco Unified Presence before 6.0(1) allows remote attackers to cause a denial of service (core dump and service interruption) via malformed packets, aka Bug ID CSCsh50164. Denial of service due to packets intentionally created by a remote attacker (DoS) There is a possibility of being put into a state. The problem is Bug ID : CSCsh50164 It is a problem.Please refer to the “Overview” for the impact of this vulnerability. An attacker can exploit this issue to crash the affected device, denying service to legitimate users. The CISCO AKA number is CSCsh50164. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. The vulnerabilities affect version 1.0. SOLUTION: Upgrade to version 6.0(3). http://www.cisco.com/pcgi-bin/tablebuild.pl/cup-60?psrtdcat20e2 PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20080514-cup.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-1158 // JVNDB: JVNDB-2008-002009 // BID: 29219 // VULHUB: VHN-31283 // PACKETSTORM: 66439

AFFECTED PRODUCTS

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 1.9

vendor:ciscomodel:unified presencescope:eqversion:6.0

Trust: 1.6

vendor:ciscomodel:unified presence serverscope:eqversion:1.0\(2\)

Trust: 1.6

vendor:ciscomodel:unified presence serverscope:eqversion:1.0\(3\)

Trust: 1.6

vendor:ciscomodel:unified presence serverscope:eqversion:1.0\(1\)

Trust: 1.6

vendor:ciscomodel:unified presencescope:lteversion:6.0

Trust: 0.8

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:neversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(3)

Trust: 0.3

sources: BID: 29219 // JVNDB: JVNDB-2008-002009 // CNNVD: CNNVD-200805-189 // NVD: CVE-2008-1158

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1158
value: HIGH

Trust: 1.0

NVD: CVE-2008-1158
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200805-189
value: HIGH

Trust: 0.6

VULHUB: VHN-31283
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-1158
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31283
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31283 // JVNDB: JVNDB-2008-002009 // CNNVD: CNNVD-200805-189 // NVD: CVE-2008-1158

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-31283 // JVNDB: JVNDB-2008-002009 // NVD: CVE-2008-1158

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200805-189

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200805-189

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002009

PATCH

title:cisco-sa-20080514-cupurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-002009

EXTERNAL IDS

db:NVDid:CVE-2008-1158

Trust: 2.8

db:BIDid:29219

Trust: 2.0

db:SECUNIAid:30240

Trust: 1.8

db:SECTRACKid:1020023

Trust: 1.7

db:VUPENid:ADV-2008-1534

Trust: 1.7

db:JVNDBid:JVNDB-2008-002009

Trust: 0.8

db:CNNVDid:CNNVD-200805-189

Trust: 0.7

db:CISCOid:20080514 CISCO UNIFIED PRESENCE DENIAL OF SERVICE VULNERABILITIES

Trust: 0.6

db:XFid:42412

Trust: 0.6

db:VULHUBid:VHN-31283

Trust: 0.1

db:PACKETSTORMid:66439

Trust: 0.1

sources: VULHUB: VHN-31283 // BID: 29219 // JVNDB: JVNDB-2008-002009 // PACKETSTORM: 66439 // CNNVD: CNNVD-200805-189 // NVD: CVE-2008-1158

REFERENCES

url:http://www.securityfocus.com/bid/29219

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080995682.shtml

Trust: 1.7

url:http://securitytracker.com/id?1020023

Trust: 1.7

url:http://secunia.com/advisories/30240

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1534

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42412

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1158

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1158

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/42412

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1534

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20080514-cup.shtml

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/ps6837/index.html

Trust: 0.3

url:/archive/1/492092

Trust: 0.3

url:http://secunia.com/advisories/30240/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/cup-60?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/12424/

Trust: 0.1

sources: VULHUB: VHN-31283 // BID: 29219 // JVNDB: JVNDB-2008-002009 // PACKETSTORM: 66439 // CNNVD: CNNVD-200805-189 // NVD: CVE-2008-1158

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200805-189

SOURCES

db:VULHUBid:VHN-31283
db:BIDid:29219
db:JVNDBid:JVNDB-2008-002009
db:PACKETSTORMid:66439
db:CNNVDid:CNNVD-200805-189
db:NVDid:CVE-2008-1158

LAST UPDATE DATE

2024-11-23T21:56:53.777000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31283date:2017-08-08T00:00:00
db:BIDid:29219date:2008-05-14T23:55:00
db:JVNDBid:JVNDB-2008-002009date:2008-12-19T00:00:00
db:CNNVDid:CNNVD-200805-189date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1158date:2024-11-21T00:43:48.890

SOURCES RELEASE DATE

db:VULHUBid:VHN-31283date:2008-05-16T00:00:00
db:BIDid:29219date:2008-05-14T00:00:00
db:JVNDBid:JVNDB-2008-002009date:2008-12-19T00:00:00
db:PACKETSTORMid:66439date:2008-05-19T18:31:39
db:CNNVDid:CNNVD-200805-189date:2008-05-16T00:00:00
db:NVDid:CVE-2008-1158date:2008-05-16T12:54:00