ID

VAR-201304-0287


CVE

CVE-2013-1176


TITLE

Multiple Cisco TelePresence Product denial of service vulnerability

Trust: 1.2

sources: CNNVD: CNNVD-201304-397 // CNNVD: CNNVD-201304-418

DESCRIPTION

The DSP card on Cisco TelePresence MCU 4500 and 4501 devices before 4.3(2.30), TelePresence MCU MSE 8510 devices before 4.3(2.30), and TelePresence Server before 2.3(1.55) does not properly validate H.264 data, which allows remote attackers to cause a denial of service (device reload) via crafted RTP packets in a (1) SIP session or (2) H.323 session, aka Bug IDs CSCuc11328 and CSCub05448. Vendors have confirmed this vulnerability Bug ID CSCuc11328 ,and CSCub05448 It is released as.By a third party (1) SIP Session, or (2) H.323 Cleverly crafted in session RTP Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco TelePresence is a set of video conferencing solutions called "Telepresence" systems from Cisco (USA). This solution provides components such as audio and video space, which can provide remote participants with a "face-to-face" virtual conference room effect. A denial of service vulnerability exists in several Cisco TelePresence products. An attacker could use this vulnerability to reload the device and deny legitimate users. The vulnerability exists in the following products: Cisco TelePresence MCU, Cisco TelePresence Server. The vulnerability originates from the program H.264 data is not properly validated

Trust: 2.52

sources: NVD: CVE-2013-1176 // JVNDB: JVNDB-2013-002413 // CNNVD: CNNVD-201304-397 // BID: 59272 // VULHUB: VHN-61178

AFFECTED PRODUCTS

vendor:ciscomodel:telepresence server softwarescope:eqversion:2.1\(1.37\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.1\(1.59\)

Trust: 1.6

vendor:ciscomodel:telepresence server softwarescope:eqversion:2.1\(1.33\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.2\(1.43\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.2\(1.46\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.1\(1.51\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.1\(1.51\)

Trust: 1.6

vendor:ciscomodel:telepresence server softwarescope:eqversion:2.2\(1.43\)

Trust: 1.6

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:lteversion:4.3\(2.18\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4505scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4520scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4515scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.2\(1.43\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:lteversion:4.3\(2.18\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.3\(1.68\)

Trust: 1.0

vendor:ciscomodel:telepresence server 7010scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.3\(1.68\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu mse series softwarescope:lteversion:4.3\(2.18\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.2\(1.43\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.2\(1.46\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu mse 8510scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.2\(1.50\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.2\(1.46\)

Trust: 1.0

vendor:ciscomodel:telepresence server softwarescope:lteversion:2.2\(1.54\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.2\(1.50\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.1\(1.59\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.1\(1.51\)

Trust: 1.0

vendor:ciscomodel:telepresence server mse 8710scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:eqversion:4.1\(1.59\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.2\(1.50\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4510scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:eqversion:4.3\(1.68\)

Trust: 1.0

vendor:ciscomodel:telepresence mcu 4500 series softwarescope:ltversion:4.3(2.30)

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4501scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4501 series softwarescope:ltversion:4.3(2.30)

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4505scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4510scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4515scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu 4520scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu mse 8510scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence mcu mse series softwarescope:ltversion:4.3(2.30)

Trust: 0.8

vendor:ciscomodel:telepresence server 7010scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence server mse 8710scope: - version: -

Trust: 0.8

vendor:ciscomodel:telepresence server softwarescope:ltversion:2.3(1.55)

Trust: 0.8

vendor:ciscomodel:telepresence server softwarescope:eqversion:2.2\(1.54\)

Trust: 0.6

vendor:ciscomodel:telepresence mcu mse series softwarescope:eqversion:4.3\(2.18\)

Trust: 0.6

sources: JVNDB: JVNDB-2013-002413 // CNNVD: CNNVD-201304-418 // NVD: CVE-2013-1176

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1176
value: HIGH

Trust: 1.0

NVD: CVE-2013-1176
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201304-418
value: HIGH

Trust: 0.6

VULHUB: VHN-61178
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1176
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61178
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61178 // JVNDB: JVNDB-2013-002413 // CNNVD: CNNVD-201304-418 // NVD: CVE-2013-1176

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-61178 // JVNDB: JVNDB-2013-002413 // NVD: CVE-2013-1176

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201304-397 // CNNVD: CNNVD-201304-418

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201304-418

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002413

PATCH

title:cisco-sa-20130417-tpiurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-tpi

Trust: 0.8

title:28929url:http://tools.cisco.com/security/center/viewAlert.x?alertId=28929

Trust: 0.8

title:cisco-sa-20130417-tpiurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117760_cisco-sa-20130417-tpi-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-002413

EXTERNAL IDS

db:NVDid:CVE-2013-1176

Trust: 2.8

db:BIDid:59272

Trust: 1.0

db:JVNDBid:JVNDB-2013-002413

Trust: 0.8

db:CNNVDid:CNNVD-201304-418

Trust: 0.7

db:CNNVDid:CNNVD-201304-397

Trust: 0.6

db:SECUNIAid:53129

Trust: 0.6

db:CISCOid:20130417 CISCO TELEPRESENCE INFRASTRUCTURE DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-61178

Trust: 0.1

sources: VULHUB: VHN-61178 // BID: 59272 // JVNDB: JVNDB-2013-002413 // CNNVD: CNNVD-201304-397 // CNNVD: CNNVD-201304-418 // NVD: CVE-2013-1176

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130417-tpi

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1176

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1176

Trust: 0.8

url:http://www.securityfocus.com/bid/59272

Trust: 0.6

url:http://secunia.com/advisories/53129

Trust: 0.6

url:http://www.cisco.com

Trust: 0.3

sources: VULHUB: VHN-61178 // BID: 59272 // JVNDB: JVNDB-2013-002413 // CNNVD: CNNVD-201304-397 // CNNVD: CNNVD-201304-418 // NVD: CVE-2013-1176

CREDITS

Cisco

Trust: 0.9

sources: BID: 59272 // CNNVD: CNNVD-201304-397

SOURCES

db:VULHUBid:VHN-61178
db:BIDid:59272
db:JVNDBid:JVNDB-2013-002413
db:CNNVDid:CNNVD-201304-397
db:CNNVDid:CNNVD-201304-418
db:NVDid:CVE-2013-1176

LAST UPDATE DATE

2024-11-23T22:35:24.273000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61178date:2013-04-19T00:00:00
db:BIDid:59272date:2013-04-22T12:50:00
db:JVNDBid:JVNDB-2013-002413date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-397date:2013-04-19T00:00:00
db:CNNVDid:CNNVD-201304-418date:2013-04-19T00:00:00
db:NVDid:CVE-2013-1176date:2024-11-21T01:49:03.067

SOURCES RELEASE DATE

db:VULHUBid:VHN-61178date:2013-04-18T00:00:00
db:BIDid:59272date:2013-04-17T00:00:00
db:JVNDBid:JVNDB-2013-002413date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-397date:2013-04-19T00:00:00
db:CNNVDid:CNNVD-201304-418date:2013-04-19T00:00:00
db:NVDid:CVE-2013-1176date:2013-04-18T18:55:03.970