CVE-2015-0725 (GCVE-0-2015-0725)
Vulnerability from cvelistv5
Published
2015-07-16 21:00
Modified
2024-08-06 04:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cisco Videoscape Distribution Suite Service Broker (aka VDS-SB), when a VDSM configuration on UCS is used, and Videoscape Distribution Suite for Internet Streaming (aka VDS-IS or CDS-IS) before 3.3.1 R7 and 4.x before 4.0.0 R4 allow remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug IDs CSCus79834 and CSCuu63409.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150715 Cisco Videoscape Delivery System Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds" }, { "name": "1032936", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032936" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Videoscape Distribution Suite Service Broker (aka VDS-SB), when a VDSM configuration on UCS is used, and Videoscape Distribution Suite for Internet Streaming (aka VDS-IS or CDS-IS) before 3.3.1 R7 and 4.x before 4.0.0 R4 allow remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug IDs CSCus79834 and CSCuu63409." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-21T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150715 Cisco Videoscape Delivery System Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds" }, { "name": "1032936", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032936" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Videoscape Distribution Suite Service Broker (aka VDS-SB), when a VDSM configuration on UCS is used, and Videoscape Distribution Suite for Internet Streaming (aka VDS-IS or CDS-IS) before 3.3.1 R7 and 4.x before 4.0.0 R4 allow remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug IDs CSCus79834 and CSCuu63409." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150715 Cisco Videoscape Delivery System Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds" }, { "name": "1032936", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032936" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0725", "datePublished": "2015-07-16T21:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-0725\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2015-07-16T21:59:00.090\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco Videoscape Distribution Suite Service Broker (aka VDS-SB), when a VDSM configuration on UCS is used, and Videoscape Distribution Suite for Internet Streaming (aka VDS-IS or CDS-IS) before 3.3.1 R7 and 4.x before 4.0.0 R4 allow remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug IDs CSCus79834 and CSCuu63409.\"},{\"lang\":\"es\",\"value\":\"Cisco Videoscape Distribution Suite Service Broker (tambi\u00e9n conocido como VDS-SB), cuando se usa una configuraci\u00f3n VDSM en UCS , y Videoscape Distribution Suite for Internet Streaming (tambi\u00e9n conocida como VDS-IS or CDS-IS) anterior 3.3.1 R7 y 4.x anterior a 4.0.0 R4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de peticiones HTTP manipuladas, tambi\u00e9n conocido como Bug IDs CSCus79834 and CSCuu63409.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C3BF288-D7C6-4853-8811-49E0A2AA4738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E68994-A3BC-4CAE-AFF4-60169D307595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82785DDA-BFFE-4C48-A023-79D686DA86D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64989DC9-D1F8-47F5-ACEF-D66E5788D641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9838C1FB-A34D-4B29-BFFA-7D2732B4DF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"701F1B04-F382-4CA4-8946-80531312D70F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4E8FD3-4E6E-4FCD-8E19-7231035D4DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5E1108-101B-4EF6-8AD2-612CC6A4E2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28D4FB3-8058-4DB4-A682-F574598F8EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB29A377-CBA1-4658-8A81-FE90CA9DFA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.5\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA228E4-2454-44BC-B98C-CCE56D68999C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.5\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"254767E0-1161-4775-B96A-AA76C4F4EAE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.5\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D765F98B-095E-4BE3-ABEC-9FAA7063AB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.5\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB189546-130B-4598-9A98-2CF20613ACFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.5\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA29A65-9187-4CB6-AF77-06CF92E8747F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4A5FF04-BDC5-404E-B2F2-3A8860230A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B23A0B61-EE86-4940-88E2-3A19E049DCA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D8FF41-C988-4155-9FFA-A3B2C3484C61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500FC58D-3201-4200-AFD4-2AA8B6058D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E84398-B07A-48DB-B009-15C5C4725E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1A8132-8CCC-4256-AA7A-B480F85B9E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1C1FB3-9638-40F8-A55D-370FE1E87928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:2.6\\\\(3\\\\)_b50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3044703D-2735-490F-9E9C-D7ECF7F99A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"778201D4-DD8A-491C-87A8-C069C9B120DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CFB387-0E26-4940-A084-09439738C360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2_b17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36316A3B-F569-4985-A508-D2E07A099C4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2_b26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D64CFB4-EE3B-42BA-BBD9-907257064C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2_b34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE55983-0425-4B71-BCEA-FCFE54E4A56E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2_b54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA567EC8-6178-40F0-8006-DA9BEFE4AE3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.1.2_b60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC58AA7D-E9A1-40E5-8EE1-B02DDC24328F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B35BBF-903B-4721-B41F-109980300B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.0_b26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"654B9AE8-34DB-4AC7-BA31-4C3E06046A4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F9EC3E-C96A-4BBE-BEA4-8E06C05C1996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.1_b9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74314ED-FCC9-4FC8-A62B-1EF00EBA7293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.1_b15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4154C9A9-8937-48D3-8C07-AF81724E5B47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.2.1_b20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5694BA-FE4A-4842-9053-E4B19950A6CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FCD744-1D54-425E-A384-6448C7CC32B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.0:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C29BC5-DEC6-49B1-9D06-793BD7BBE4D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C50016BD-BF0B-48E0-B8FD-4EC5FD0A9C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDD96B5-13B3-4EDD-B0B8-7B37D71EC745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9180D3E7-80F1-4D5F-A390-14EF1BCA0571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"695A79C6-5A0D-428F-80B5-EE303AFD7433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DD0DCA6-06D0-47A2-B5C8-54E7C2756840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"713073CE-0303-4A36-878F-C688853120C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:3.3.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"265BE715-B8CA-4AB3-BF25-8485B3890F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECD0794C-D06F-4262-9938-4B262D727AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:4.0.0:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09F3FAD2-01C7-47C2-AC02-912D71BD00B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:4.0.0:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F898AA-47AA-470E-9C06-B7A7F7D1F77A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming:4.0.0:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCA22E1-2618-4306-A47A-18AD18C66D8D\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032936\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150715-vds\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1032936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…