Multiple Vulnerabilities in Cisco Unity Connection

2015-04-01T16:00:00
ID CISCO-SA-20150401-CUC
Type cisco
Reporter Cisco
Modified 2015-04-01T15:47:53

Description

A vulnerability in the Connection Conversation Manager (CuCsMgr) process of Cisco Unity Connection could allow an unauthenticated, remote attacker to cause the SIP network port UDP 5060 to close on the affected device.

The vulnerability is due to incorrect processing of specific UDP packets. An attacker could exploit this vulnerability by sending a specific UDP packet to the configured SIP trunk of the affected device. A successful exploit could allow the attacker to cause the SIP port to close, rendering Cisco Unity Connection unable to process any further calls.

A vulnerability in the Connection Conversation Manager (CuCsMgr) process of Cisco Unity Connection could allow an unauthenticated, remote attacker to cause the CuCsMgr process to core dump and restart.

The vulnerability is due to incorrect handling of incorrectly terminated SIP conversations. An attacker could exploit this vulnerability by abnormal termination of SIP connections to the Cisco Unity Connection server. An exploit could allow the attacker to trigger a core dump of the CuCsMgr process and create a DoS condition.

A vulnerability in the Connection Conversation Manager (CuCsMgr) process of Cisco Unity Connection could allow an unauthenticated, remote attacker to cause the CuCsMgr process to core dump and restart.

The vulnerability is due to incorrect processing of crafted SIP INVITE messages. An attacker could exploit this vulnerability by sending crafted SIP INVITE messages to the Cisco Unity Connection server. An exploit could allow the attacker to trigger a core dump of the CuCsMgr process and create a DoS condition.

A vulnerability in the Connection Conversation Manager (CuCsMgr) process of Cisco Unity Connection could allow an unauthenticated, remote attacker to cause the CuCsMgr process to core dump and restart.

The vulnerability is due to incorrect processing of crafted SIP INVITE messages. An attacker could exploit this vulnerability by sending crafted SIP INVITE messages to the Cisco Unity Connection server. An exploit could allow the attacker to trigger a core dump of the CuCsMgr process and create a denial of service condition.

A vulnerability in the SIP call handling code of Cisco Unity Connection could allow an unauthenticated, remote attacker to cause all the SIP connection lines (ports) to be consumed.

The vulnerability is due to not releasing allocated resources under specific connection scenarios. An attacker could exploit this vulnerability by abnormally terminating a SIP session. An exploit could allow the attacker to consume all available SIP ports on Unity Connection, preventing any further connections.

Cisco Unity Connection contains multiple vulnerabilities, when it is configured with Session Initiation Protocol (SIP) trunk integration. The vulnerabilities described in this advisory are denial of service vulnerabilities impacting the availability of Cisco Unity Connection for processing SIP messages.

Cisco has released software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc"]