ID

VAR-201205-0024


CVE

CVE-2011-4019


TITLE

Cisco IOS and Cisco Unified Communications Manager Service disruption in ( Memory consumption ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-002225

DESCRIPTION

Memory leak in Cisco IOS 12.4 and 15.0 through 15.2, and Cisco Unified Communications Manager (CUCM) 7.x, allows remote attackers to cause a denial of service (memory consumption) via a crafted response to a SIP SUBSCRIBE message, aka Bug IDs CSCto93837 and CSCtj61883. Unified Communications Manager is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 1.98

sources: NVD: CVE-2011-4019 // JVNDB: JVNDB-2012-002225 // BID: 78392 // VULHUB: VHN-51964

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.1

vendor:ciscomodel:unified communications managerscope:eqversion:7.1

Trust: 1.9

vendor:ciscomodel:unified communications managerscope:eqversion:7.0

Trust: 1.9

vendor:ciscomodel:unified communications manager 7.1 su1scope: - version: -

Trust: 1.8

vendor:ciscomodel:unified communications manager 7.1scope: - version: -

Trust: 1.8

vendor:ciscomodel:unified communications managerscope:eqversion:7.0_base

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su1

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su4

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.1_base

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su1a

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su5

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)su2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2b\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5\)su1a

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(1\)su1a

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.0\(2a\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)su1a

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3a\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(3b\)su2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2b\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(2a\)su1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:7.1\(5b\)su3

Trust: 1.0

vendor:ciscomodel:unified communications manager 7.1 su1ascope: - version: -

Trust: 0.9

vendor:ciscomodel:unified communications managerscope:eqversion:7.x

Trust: 0.8

vendor:ciscomodel:unified communications manager 7.0 su1scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager business edition basescope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:unified communications manager business edition 7.0%281%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su5scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su3scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(3)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager basescope:eqversion:7.0

Trust: 0.3

sources: BID: 78392 // JVNDB: JVNDB-2012-002225 // CNNVD: CNNVD-201205-066 // NVD: CVE-2011-4019

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4019
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-4019
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201205-066
value: MEDIUM

Trust: 0.6

VULHUB: VHN-51964
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-4019
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51964
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51964 // JVNDB: JVNDB-2012-002225 // CNNVD: CNNVD-201205-066 // NVD: CVE-2011-4019

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-51964 // JVNDB: JVNDB-2012-002225 // NVD: CVE-2011-4019

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201205-066

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201205-066

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002225

PATCH

title:Release 15.1(1)T Caveatsurl:http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151TCAVS.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002225

EXTERNAL IDS

db:NVDid:CVE-2011-4019

Trust: 2.8

db:JVNDBid:JVNDB-2012-002225

Trust: 0.8

db:CNNVDid:CNNVD-201205-066

Trust: 0.7

db:BIDid:78392

Trust: 0.4

db:VULHUBid:VHN-51964

Trust: 0.1

sources: VULHUB: VHN-51964 // BID: 78392 // JVNDB: JVNDB-2012-002225 // CNNVD: CNNVD-201205-066 // NVD: CVE-2011-4019

REFERENCES

url:http://www.cisco.com/en/us/docs/ios/15_1/release/notes/151tcavs.html

Trust: 2.0

url:http://www.cisco.com/web/software/282074295/90289/cucm-readme-715bsu5.pdf

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4019

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4019

Trust: 0.8

sources: VULHUB: VHN-51964 // BID: 78392 // JVNDB: JVNDB-2012-002225 // CNNVD: CNNVD-201205-066 // NVD: CVE-2011-4019

CREDITS

Unknown

Trust: 0.3

sources: BID: 78392

SOURCES

db:VULHUBid:VHN-51964
db:BIDid:78392
db:JVNDBid:JVNDB-2012-002225
db:CNNVDid:CNNVD-201205-066
db:NVDid:CVE-2011-4019

LAST UPDATE DATE

2024-11-23T22:18:55.206000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51964date:2012-05-30T00:00:00
db:BIDid:78392date:2012-05-03T00:00:00
db:JVNDBid:JVNDB-2012-002225date:2012-05-08T00:00:00
db:CNNVDid:CNNVD-201205-066date:2012-05-04T00:00:00
db:NVDid:CVE-2011-4019date:2024-11-21T01:31:42.607

SOURCES RELEASE DATE

db:VULHUBid:VHN-51964date:2012-05-03T00:00:00
db:BIDid:78392date:2012-05-03T00:00:00
db:JVNDBid:JVNDB-2012-002225date:2012-05-08T00:00:00
db:CNNVDid:CNNVD-201205-066date:2012-05-04T00:00:00
db:NVDid:CVE-2011-4019date:2012-05-03T10:11:39.530