Lucene search

K
cve[email protected]CVE-2017-3790
HistoryFeb 01, 2017 - 7:59 p.m.

CVE-2017-3790

2017-02-0119:59:00
CWE-119
CWE-399
CWE-20
web.nvd.nist.gov
25
4
vulnerability
cisco
expressway series
telepresence
vcs
remote attacker
denial of service
dos
rtp
buffer overflow
packet parser
x8.8.2
software update
cscus99263

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%

A vulnerability in the received packet parser of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) software could allow an unauthenticated, remote attacker to cause a reload of the affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient size validation of user-supplied data. An attacker could exploit this vulnerability by sending crafted H.224 data in Real-Time Transport Protocol (RTP) packets in an H.323 call. An exploit could allow the attacker to overflow a buffer in a cache that belongs to the received packet parser, which will result in a crash of the application, resulting in a DoS condition. All versions of Cisco Expressway Series Software and Cisco TelePresence VCS Software prior to version X8.8.2 are vulnerable. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCus99263.

Affected configurations

NVD
Node
ciscoexpresswayMatchx8.1.0
OR
ciscoexpresswayMatchx8.1.1
OR
ciscoexpresswayMatchx8.1.2
OR
ciscoexpresswayMatchx8.1_base
OR
ciscoexpresswayMatchx8.2.1
OR
ciscoexpresswayMatchx8.2.2
OR
ciscoexpresswayMatchx8.2_base
OR
ciscoexpresswayMatchx8.5rc4
OR
ciscoexpresswayMatchx8.5.0
OR
ciscoexpresswayMatchx8.5.1
OR
ciscoexpresswayMatchx8.5.2
OR
ciscoexpresswayMatchx8.5.3
OR
ciscoexpresswayMatchx8.5_base
OR
ciscoexpresswayMatchx8.6.0
OR
ciscoexpresswayMatchx8.6.1
OR
ciscoexpresswayMatchx8.7.0
OR
ciscoexpresswayMatchx8.7.1
OR
ciscoexpresswayMatchx8.7.2
OR
ciscoexpresswayMatchx8.7.3
OR
ciscoexpresswayMatchx8.8.0
OR
ciscoexpresswayMatchx8.8.1
OR
ciscotelepresence_video_communication_serverMatchx5.2_base
OR
ciscotelepresence_video_communication_serverMatchx6.0_base
OR
ciscotelepresence_video_communication_serverMatchx6.1_base
OR
ciscotelepresence_video_communication_serverMatchx7.0.0
OR
ciscotelepresence_video_communication_serverMatchx7.0.1
OR
ciscotelepresence_video_communication_serverMatchx7.0.2
OR
ciscotelepresence_video_communication_serverMatchx7.0.3
OR
ciscotelepresence_video_communication_serverMatchx7.1_base
OR
ciscotelepresence_video_communication_serverMatchx7.2.0
OR
ciscotelepresence_video_communication_serverMatchx7.2.1
OR
ciscotelepresence_video_communication_serverMatchx7.2.2

CNA Affected

[
  {
    "product": "Cisco Expressway Series Software and Cisco TelePresence VCS Software All versions prior to version X8.8.2 are vulnerable",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco Expressway Series Software and Cisco TelePresence VCS Software All versions prior to version X8.8.2 are vulnerable"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%