ID

VAR-201009-0065


CVE

CVE-2010-2834


TITLE

plural Cisco Service disruption in products (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-002125

DESCRIPTION

Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5)SU1, 7.x before 7.1(5), and 8.0 before 8.0(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via crafted SIP registration traffic over UDP, aka Bug IDs CSCtf72678 and CSCtf14987. plural Cisco The product includes SIP Service operation is interrupted due to incomplete processing (DoS) There is a vulnerability that becomes a condition. The problem is Bug IDs CSCtf72678 and CSCtf14987 It is a problem.By a third party UDP Cleverly crafted via SIP Service disruption through registered traffic (DoS) There is a possibility of being put into a state. Cisco Unified Communications Manager is a call processing component in the Cisco IP Telephony solution. When dealing with an illegal \"Refer-To\" header, there is an error, and special SIP messages can be used to terminate important processes and disrupt voice services. An attacker can exploit this issue to cause an interruption in voice services or cause the affected device to reload, denying service to legitimate users. This issue is tracked by Cisco Bug IDs CSCtf14987 and CSCtf72678. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerabilities Advisory ID: cisco-sa-20100922-cucmsip http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml Revision 1.0 For Public Release 2010 September 22 1600 UTC (GMT) - --------------------------------------------------------------------- Summary ======= Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. To address these vulnerabilities, Cisco has released free software updates. There is a workaround for these vulnerabilities. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml Note: Cisco IOS Software is also affected by the vulnerabilities described in this advisory. A companion advisory for Cisco IOS software is available at: http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The software version can also be determined by running the show version active command via the command-line interface. No other Cisco products are currently known to be affected by these vulnerabilities. All SIP ports (TCP ports 5060 and 5061 and UDP ports 5060 and 5061) are affected. The first SIP DoS vulnerability is documented in Cisco Bug ID CSCta31358 ( registered customers only) and has been assigned the CVE identifier CVE-2010-2835. The corresponding IOS defect is CSCta20040. The second SIP DoS vulnerability is documented in Cisco Bug ID CSCtf14987 ( registered customers only) and has been assigned the CVE identifier CVE-2010-2834. The corresponding IOS defect is CSCtf72678. Vulnerability Scoring Details ============================= Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0. CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response. Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks. Cisco has provided an FAQ to answer additional questions regarding CVSS at: http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at: http://intellishield.cisco.com/security/alertmanager/cvss CSCta31358 - c3945 GW crashes while testing REFER method with invalid Refer-To header CVSS Base Score - 7.8 Access Vector Network Access Complexity Low Authentication None Confidentiality Impact None Integrity Impact None Availability Impact Complete CVSS Temporal Score - 6.4 Exploitability Functional Remediation Level Official Fix Report Confidence Confirmed CSCtf14987 - CCM Coredump Generated During UDP SIP Registration Fuzzing CVSS Base Score - 7.8 Access Vector Network Access Complexity Low Authentication None Confidentiality Impact None Integrity Impact None Availability Impact Complete CVSS Temporal Score - 6.4 Exploitability Functional Remediation Level Official Fix Report Confidence Confirmed Impact ====== Successful exploitation of the vulnerabilities that are described in this advisory could result in the interruption of voice services. Software Versions and Fixes =========================== When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance. +---------------------------------------+ | Cisco Unified | Recommended | | Communication Manager | Release | | Version | | |-------------------------+-------------| | 6.x | 6.1(5)SU1 | |-------------------------+-------------| | 7.x | 7.1(5b)SU2 | |-------------------------+-------------| | 8.x | 8.0(3a) | +---------------------------------------+ Note: The recommended releases listed in the table above are the latest Cisco Unified Communications Manager versions available at the publication of this advisory, and each release includes software fixes for all the vulnerabilities described in this advisory. Cisco Unified Communications Manager software can be downloaded at the following link: http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=268439621 Workarounds =========== For customers who do not use SIP in their environment, there is a workaround for these vulnerabilities. SIP processing is enabled by default. Use the following instructions to disable SIP processing: Step 1: Log into the Cisco Unified CM Administration web interface. Step 3: Change the "SIP Interoperability Enabled" parameter to False, and click Save. For information on how to restart the service, refer to the "Restarting the Cisco CallManager Service" section of the document at: http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/7_1_2/ccmcfg/b03dpi.html#wp1075124 It is possible to mitigate these vulnerabilities by implementing filtering on screening devices and permitting access to TCP ports 5060 and 5061 and UDP ports 5060 and 5061 only from networks that require SIP access to Cisco Unified Communications Manager servers. Additional mitigations that can be deployed on Cisco devices in the network are available in the companion document "Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in Cisco Voice Products", which is available at the following location: http://www.cisco.com/warp/public/707/cisco-amb-20100922-voice.shtml Obtaining Fixed Software ======================== Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades. Customers with Service Contracts +------------------------------- Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com Customers using Third Party Support Organizations +------------------------------------------------ Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory. The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed. Customers without Service Contracts +---------------------------------- Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows. * +1 800 553 2447 (toll free from within North America) * +1 408 526 7209 (toll call from anywhere in the world) * e-mail: tac@cisco.com Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Refer to http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages. Exploitation and Public Announcements ===================================== The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory. All vulnerabilities described in this advisory were discovered as a result of internal testing conducted by Cisco. Status of this Notice: FINAL ============================ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution ============ This advisory is posted on Cisco's worldwide website at : http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. * cust-security-announce@cisco.com * first-bulletins@lists.first.org * bugtraq@securityfocus.com * vulnwatch@vulnwatch.org * cisco@spot.colorado.edu * cisco-nsp@puck.nether.net * full-disclosure@lists.grok.org.uk * comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History ================ +----------------------------------------+ | Revision | | Initial | | 1.0 | 2010-September-22 | public | | | | release | +----------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (Darwin) iEYEARECAAYFAkyaIp0ACgkQ86n/Gc8U/uCsDQCbBrZ7ciwiNVxErJOxLLICNgXv dE0An3lej+RKwoUMMf+GKTm/BBOHmlQL =dwdr -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. ---------------------------------------------------------------------- TITLE: Cisco IOS SIP Multiple Denial of Service Vulnerabilities SECUNIA ADVISORY ID: SA41549 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41549/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41549 RELEASE DATE: 2010-09-24 DISCUSS ADVISORY: http://secunia.com/advisories/41549/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41549/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41549 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information see vulnerability #1: SA36498 2) An error when processing certain unspecified Session Initiation Protocol (SIP) traffic can be exploited to cause a device to reload. 3) An error when processing specially crafted Session Initiation Protocol (SIP) packets can be exploited to cause a device to reload. SOLUTION: Apply updates (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: cisco-sa-20100922-sip: http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . SOLUTION: Update to the latest version

Trust: 2.79

sources: NVD: CVE-2010-2834 // JVNDB: JVNDB-2010-002125 // CNVD: CNVD-2010-2083 // BID: 43394 // VULHUB: VHN-45439 // PACKETSTORM: 94153 // PACKETSTORM: 94203 // PACKETSTORM: 94207

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-2083

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.1

vendor:ciscomodel:unified communications manager 7.1scope: - version: -

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.4xq

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xr

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xl

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xp

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xm

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xk

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xg

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xn

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xj

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4xf

Trust: 1.6

vendor:ciscomodel:unified communications manager 7.1 su1scope: - version: -

Trust: 1.5

vendor:ciscomodel:unified communications manager 6.1scope: - version: -

Trust: 1.5

vendor:ciscomodel:unified communications managerscope:eqversion:7.0

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5.1

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.3

vendor:ciscomodel:ios xescope:eqversion:2.5

Trust: 1.1

vendor:ciscomodel:iosscope:eqversion:12.1yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sbc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mra

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yf

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(3b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ira

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3za

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yd

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)su1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2dx

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yg

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(4a\)su2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ire

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ya

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(2\)su1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2scb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yh

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(2\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1t

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2scc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xb

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)su2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yc

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)su2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(3a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xt

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yd

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:8.0\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2dd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2cz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3va

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2su

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0m

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sca

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4sw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ze

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixg

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixc

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)su1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xk

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(4\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4gc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2by

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2irc

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(1a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.0\(1b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ex

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixa

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sre

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zy

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yk

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:8.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2tpc

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2a\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yl

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.5.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2mrb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yd

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yw

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.0\(1.2114.1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2irb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ixh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2bx

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.0\(1.2121.1\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2b\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2srb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yb

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:2.6.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(3b\)su1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yu

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xt

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(1b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sxb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sra

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2yv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mda

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ird

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mra

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3tpc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2scd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2zu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:2.6

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:5.1(3g)

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:6.1(5)su1

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:7.1(5b)su2

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:8.0(3a)

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:eqversion:8.x

Trust: 0.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.x

Trust: 0.6

vendor:ciscomodel:unified communications managerscope:eqversion:6.x

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.1 su1ascope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.0scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.0 su1scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager su1scope:eqversion:6.1

Trust: 0.6

vendor:ciscomodel:unified communications managerscope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.0 su1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.0(1)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.0(0.98000.106)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(3)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su3scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications manager 6.1 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 6.1 su1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:unified communications manager 6.1 su1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:2.5.2

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3vascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.0scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 6.1 su1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:2.6.2

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi11scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2010-2083 // BID: 43394 // JVNDB: JVNDB-2010-002125 // CNNVD: CNNVD-201009-244 // NVD: CVE-2010-2834

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2834
value: HIGH

Trust: 1.0

NVD: CVE-2010-2834
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201009-244
value: HIGH

Trust: 0.6

VULHUB: VHN-45439
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-2834
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-45439
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-45439 // JVNDB: JVNDB-2010-002125 // CNNVD: CNNVD-201009-244 // NVD: CVE-2010-2834

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-2834

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201009-244

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201009-244

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002125

PATCH

title:cisco-amb-20100922-voiceurl:http://www.cisco.com/warp/public/707/cisco-amb-20100922-voice.shtml

Trust: 0.8

title:cisco-sa-20100922-sipurl:http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml

Trust: 0.8

title:cisco-sa-20090826-cucmurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml

Trust: 0.8

title:cisco-sa-20100922-cucmsipurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a313.shtml

Trust: 0.8

title:21382url:http://tools.cisco.com/security/center/viewAlert.x?alertId=21382

Trust: 0.8

title:cisco-sa-20100922-sipurl:http://www.cisco.com/JP/support/public/ht/security/109/1091519/cisco-sa-20100922-sip-j.shtml

Trust: 0.8

title:A patch with an error vulnerability when Cisco Unified Communications Manager processes an illegal \"Refer-To\" headerurl:https://www.cnvd.org.cn/patchInfo/show/1093

Trust: 0.6

sources: CNVD: CNVD-2010-2083 // JVNDB: JVNDB-2010-002125

EXTERNAL IDS

db:NVDid:CVE-2010-2834

Trust: 3.5

db:SECUNIAid:41549

Trust: 0.9

db:VUPENid:ADV-2010-2478

Trust: 0.8

db:JVNDBid:JVNDB-2010-002125

Trust: 0.8

db:SECUNIAid:41437

Trust: 0.7

db:CNNVDid:CNNVD-201009-244

Trust: 0.7

db:CNVDid:CNVD-2010-2083

Trust: 0.6

db:CISCOid:20100922 CISCO IOS SOFTWARE SESSION INITIATION PROTOCOL DENIAL OF SERVICE VULNERABILITIES

Trust: 0.6

db:CISCOid:20100922 CISCO UNIFIED COMMUNICATIONS MANAGER SESSION INITIATION PROTOCOL DENIAL OF SERVICE VULNERABILITIES

Trust: 0.6

db:BIDid:43394

Trust: 0.4

db:VULHUBid:VHN-45439

Trust: 0.1

db:PACKETSTORMid:94153

Trust: 0.1

db:PACKETSTORMid:94203

Trust: 0.1

db:PACKETSTORMid:94207

Trust: 0.1

sources: CNVD: CNVD-2010-2083 // VULHUB: VHN-45439 // BID: 43394 // JVNDB: JVNDB-2010-002125 // PACKETSTORM: 94153 // PACKETSTORM: 94203 // PACKETSTORM: 94207 // CNNVD: CNNVD-201009-244 // NVD: CVE-2010-2834

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b4a30f.shtml

Trust: 2.0

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b4a313.shtml

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2834

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2834

Trust: 0.8

url:http://secunia.com/advisories/41549

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2478

Trust: 0.8

url:http://secunia.com/advisories/41437/

Trust: 0.7

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/voicesw/ps556/

Trust: 0.3

url:/archive/1/513898

Trust: 0.3

url:/archive/1/513901

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml

Trust: 0.2

url:http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml

Trust: 0.2

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/advisories/windows_insecure_library_loading/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://www.cisco.com/go/psirt

Trust: 0.1

url:http://www.cisco.com/en/us/docs/general/warranty/english/eu1ken_.html

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2834

Trust: 0.1

url:http://www.cisco.com/en/us/support/tsd_cisco_worldwide_contacts.html

Trust: 0.1

url:http://www.cisco.com/en/us/docs/voice_ip_comm/cucm/admin/7_1_2/ccmcfg/b03dpi.html#wp1075124

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Trust: 0.1

url:http://www.cisco.com/public/sw-center/sw-usingswc.shtml

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-amb-20100922-voice.shtml

Trust: 0.1

url:http://www.cisco.com

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/cisco_erp_sep10.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2835

Trust: 0.1

url:http://tools.cisco.com/support/downloads/go/redirect.x?mdfid=268439621

Trust: 0.1

url:http://intellishield.cisco.com/security/alertmanager/cvss

Trust: 0.1

url:http://secunia.com/advisories/41549/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41549

Trust: 0.1

url:http://secunia.com/advisories/41549/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41437

Trust: 0.1

url:http://secunia.com/advisories/41437/#comments

Trust: 0.1

sources: CNVD: CNVD-2010-2083 // VULHUB: VHN-45439 // BID: 43394 // JVNDB: JVNDB-2010-002125 // PACKETSTORM: 94153 // PACKETSTORM: 94203 // PACKETSTORM: 94207 // CNNVD: CNNVD-201009-244 // NVD: CVE-2010-2834

CREDITS

Cisco

Trust: 0.3

sources: BID: 43394

SOURCES

db:CNVDid:CNVD-2010-2083
db:VULHUBid:VHN-45439
db:BIDid:43394
db:JVNDBid:JVNDB-2010-002125
db:PACKETSTORMid:94153
db:PACKETSTORMid:94203
db:PACKETSTORMid:94207
db:CNNVDid:CNNVD-201009-244
db:NVDid:CVE-2010-2834

LAST UPDATE DATE

2024-11-23T21:47:14.809000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-2083date:2010-09-25T00:00:00
db:VULHUBid:VHN-45439date:2010-09-24T00:00:00
db:BIDid:43394date:2015-03-19T09:09:00
db:JVNDBid:JVNDB-2010-002125date:2010-10-13T00:00:00
db:CNNVDid:CNNVD-201009-244date:2011-05-03T00:00:00
db:NVDid:CVE-2010-2834date:2024-11-21T01:17:27.867

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-2083date:2010-09-25T00:00:00
db:VULHUBid:VHN-45439date:2010-09-23T00:00:00
db:BIDid:43394date:2010-09-22T00:00:00
db:JVNDBid:JVNDB-2010-002125date:2010-10-13T00:00:00
db:PACKETSTORMid:94153date:2010-09-23T01:19:23
db:PACKETSTORMid:94203date:2010-09-25T10:02:32
db:PACKETSTORMid:94207date:2010-09-25T10:02:43
db:CNNVDid:CNNVD-201009-244date:2010-09-26T00:00:00
db:NVDid:CVE-2010-2834date:2010-09-23T19:00:13.717