CVE-2008-0529
Published Feb 15, 2008
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the telnet server in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G running SCCP firmware might allow remote authenticated users to execute arbitrary code via a crafted command.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "53A9A468-CAC3-4DC6-B839-557DBE8246D3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26830222-1503-4748-A104-334265D8F06F" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19712324-A41D-49F1-AA74-3B30A731FF47" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43F9E1FE-4BD5-40B9-B239-B2185821A551" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFE61DF2-3D61-400F-BA70-B506412C9C28" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F0B76F56-31D4-4576-AC95-00AED498F25A" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2747DB12-83B9-40E4-9671-382E241C98EE" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FDB3D25-274E-42F5-B5C1-B2A7875F94EE" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "780CE3C9-7CA3-4770-8DC9-BCB3365C32F9" } ], "operator": "OR" } ], "operator": "AND" } ]