fkie_cve-2010-2839
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
SIPD in Cisco Unified Presence 6.x before 6.0(7) and 7.x before 7.0(8) allows remote attackers to cause a denial of service (stack memory corruption and process failure) via a malformed SIP message, aka Bug ID CSCtd14474.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9CEBA2-160F-4303-9C1D-C7BD7E758CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A704B14E-EC47-47E5-8AA1-35E0138B6A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6F95246B-7822-4077-BC9C-3E1C0B02C139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D01D8A-9F92-4900-941C-0B481D277D95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E72DE400-8ACA-4D01-8BBE-7F13959F4DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F049CAA8-6FA8-4642-910C-70C8D3CEAF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1706BFD4-817A-4BA2-8B3B-60CDF1F54A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9C5872-317C-4A68-8E99-DEB224BAE607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F4FC53-3627-4826-8CFC-BEEBCB8CEC87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8BACEF63-F22A-4B39-84AE-A950AC024EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "703C2FA6-B723-41B1-BEA3-87AABD6F85DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(6\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80D0D477-4976-45FB-A089-5C19119D2BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0398D739-6A84-4817-AFD0-80A4513F1AD4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(2.1101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33A4FA6A-D37D-465D-921A-51E429A30537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(3.1101-2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE292F1-2F4F-40BE-9E2A-E3F1C55857EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(4.1101-5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B709CF6E-C148-4AD6-962B-A1055396DC8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5.1101-1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0B64ACB1-C4E5-48B9-8747-4F7AFA6955A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5.1103-2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB3FB41-7A7B-4342-9ED2-27ACDD29E5D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0.5.1102-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81DC553-FFAB-4D13-8484-E174CA918D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.3.10102-3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED42650B-EDED-4CC5-BA26-D179E7F25177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.3.10103-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B734482D-2E7E-4A4B-BB3C-3ABC2EB8FD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.4.10101-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE3D3770-3C99-4FCF-9B42-727A40D6062F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SIPD in Cisco Unified Presence 6.x before 6.0(7) and 7.x before 7.0(8) allows remote attackers to cause a denial of service (stack memory corruption and process failure) via a malformed SIP message, aka Bug ID CSCtd14474."
    },
    {
      "lang": "es",
      "value": "SIPD de Cisco Unified Presence v6.x anterior a v6.0(7) y v7.x anterior a v7.0(8) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la pila de memoria y fallo del proceso) mediante un mensaje SIP mal formado. Tambi\u00e9n se conoce como Bug ID CSCtd14474."
    }
  ],
  "id": "CVE-2010-2839",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-26T21:00:01.530",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.vupen.com/english/advisories/2010/2186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/2186"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…