ID

VAR-201902-0444


CVE

CVE-2019-1676


TITLE

Cisco Meeting Server Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-001741

DESCRIPTION

A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected. An attacker can exploit this issue to restart the affected system, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvn12248

Trust: 1.98

sources: NVD: CVE-2019-1676 // JVNDB: JVNDB-2019-001741 // BID: 106909 // VULHUB: VHN-148938

AFFECTED PRODUCTS

vendor:ciscomodel:meeting serverscope:ltversion:2.3.9

Trust: 1.8

vendor:ciscomodel:meeting serverscope:gteversion:2.3.0

Trust: 1.0

vendor:ciscomodel:meeting serverscope:eqversion:2.3.7

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.3.4

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.3.3

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.13

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.12

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.11

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.10

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.9

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.6

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.5

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.4

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.3

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.2

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:meeting serverscope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:meeting serverscope:neversion:2.3.9

Trust: 0.3

vendor:ciscomodel:meeting serverscope:neversion:2.2.14

Trust: 0.3

sources: BID: 106909 // JVNDB: JVNDB-2019-001741 // NVD: CVE-2019-1676

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1676
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1676
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1676
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201902-295
value: HIGH

Trust: 0.6

VULHUB: VHN-148938
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1676
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148938
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1676
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1676
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-148938 // JVNDB: JVNDB-2019-001741 // CNNVD: CNNVD-201902-295 // NVD: CVE-2019-1676 // NVD: CVE-2019-1676

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-148938 // JVNDB: JVNDB-2019-001741 // NVD: CVE-2019-1676

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-295

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201902-295

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001741

PATCH

title:cisco-sa-20190206-meeting-sipdosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos

Trust: 0.8

title:Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89105

Trust: 0.6

sources: JVNDB: JVNDB-2019-001741 // CNNVD: CNNVD-201902-295

EXTERNAL IDS

db:NVDid:CVE-2019-1676

Trust: 2.8

db:BIDid:106909

Trust: 2.0

db:JVNDBid:JVNDB-2019-001741

Trust: 0.8

db:CNNVDid:CNNVD-201902-295

Trust: 0.7

db:VULHUBid:VHN-148938

Trust: 0.1

sources: VULHUB: VHN-148938 // BID: 106909 // JVNDB: JVNDB-2019-001741 // CNNVD: CNNVD-201902-295 // NVD: CVE-2019-1676

REFERENCES

url:http://www.securityfocus.com/bid/106909

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190206-meeting-sipdos

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1676

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1676

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-148938 // BID: 106909 // JVNDB: JVNDB-2019-001741 // CNNVD: CNNVD-201902-295 // NVD: CVE-2019-1676

CREDITS

Cisco,This vulnerability was found during the resolution of a Cisco TAC support case.

Trust: 0.6

sources: CNNVD: CNNVD-201902-295

SOURCES

db:VULHUBid:VHN-148938
db:BIDid:106909
db:JVNDBid:JVNDB-2019-001741
db:CNNVDid:CNNVD-201902-295
db:NVDid:CVE-2019-1676

LAST UPDATE DATE

2024-11-23T22:58:46.624000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148938date:2019-10-09T00:00:00
db:BIDid:106909date:2019-02-06T00:00:00
db:JVNDBid:JVNDB-2019-001741date:2019-03-26T00:00:00
db:CNNVDid:CNNVD-201902-295date:2019-10-17T00:00:00
db:NVDid:CVE-2019-1676date:2024-11-21T04:37:04.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-148938date:2019-02-08T00:00:00
db:BIDid:106909date:2019-02-06T00:00:00
db:JVNDBid:JVNDB-2019-001741date:2019-03-26T00:00:00
db:CNNVDid:CNNVD-201902-295date:2019-02-06T00:00:00
db:NVDid:CVE-2019-1676date:2019-02-08T18:29:00.347