Lucene search

K
nessusThis script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO_TELEPRESENCE_VCS_SA_20170125-EXPRESSWAY.NASL
HistoryFeb 22, 2017 - 12:00 a.m.

Cisco TelePresence VCS / Expressway < 8.8.2 Received Packet Parser DoS

2017-02-2200:00:00
This script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
41

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

72.2%

According to its self-reported version, the Cisco TelePresence Video Communication Server (VCS) / Expressway running on the remote host is prior to 8.8.2. It is, therefore, affected by a denial of service vulnerability in the received packet parser due to insufficient size validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via specially crafted H.224 data in Real-Time Transport Protocol (RTP) packets, to cause a buffer overflow in the cache, resulting in crashing the application and a system reload.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(97326);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/07");

  script_cve_id("CVE-2017-3790");
  script_bugtraq_id(95786);
  script_xref(name:"CISCO-BUG-ID", value:"CSCus99263");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20170125-expressway");

  script_name(english:"Cisco TelePresence VCS / Expressway < 8.8.2 Received Packet Parser DoS");

  script_set_attribute(attribute:"synopsis", value:
"A video conferencing application running on the remote host is
affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco TelePresence Video
Communication Server (VCS) / Expressway running on the remote host is
prior to 8.8.2. It is, therefore, affected by a denial of service
vulnerability in the received packet parser due to insufficient size
validation of user-supplied input. An unauthenticated, remote attacker
can exploit this, via specially crafted H.224 data in Real-Time
Transport Protocol (RTP) packets, to cause a buffer overflow in the
cache, resulting in crashing the application and a system reload.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-expressway
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d2cc3432");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCus99263");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2017/Jan/72");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Cisco TelePresence VCS / Expressway version 8.8.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3790");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/01/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/22");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:telepresence_video_communication_server");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:telepresence_video_communication_server");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:telepresence_video_communication_server_software");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:expressway_software");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_telepresence_video_communication_server_detect.nbin");
  script_require_keys("Cisco/TelePresence_VCS/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("global_settings.inc");
include("misc_func.inc");

version  = get_kb_item_or_exit("Cisco/TelePresence_VCS/Version");
fullname = "Cisco TelePresence Device";
fix = '8.8.2';
bug_id = 'CSCus99263';

if (ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
  security_report_cisco(severity:SECURITY_HOLE, port:0,  version:version, fix:fix, bug_id:bug_id);
}
else audit(AUDIT_DEVICE_NOT_VULN, fullname, version);
VendorProductVersionCPE
ciscotelepresence_video_communication_servercpe:/h:cisco:telepresence_video_communication_server
ciscotelepresence_video_communication_servercpe:/a:cisco:telepresence_video_communication_server
ciscotelepresence_video_communication_server_softwarecpe:/a:cisco:telepresence_video_communication_server_software
ciscoexpressway_softwarecpe:/a:cisco:expressway_software

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

72.2%

Related for CISCO_TELEPRESENCE_VCS_SA_20170125-EXPRESSWAY.NASL