CVE-2008-0530
Published Feb 15, 2008
Last updated 7 years ago
Overview
- Description
- Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP and SIP firmware might allow remote attackers to execute arbitrary code via a crafted DNS response.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "53A9A468-CAC3-4DC6-B839-557DBE8246D3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26830222-1503-4748-A104-334265D8F06F" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19712324-A41D-49F1-AA74-3B30A731FF47" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43F9E1FE-4BD5-40B9-B239-B2185821A551" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFE61DF2-3D61-400F-BA70-B506412C9C28" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F0B76F56-31D4-4576-AC95-00AED498F25A" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2747DB12-83B9-40E4-9671-382E241C98EE" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FDB3D25-274E-42F5-B5C1-B2A7875F94EE" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3" }, { "criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "780CE3C9-7CA3-4770-8DC9-BCB3365C32F9" } ], "operator": "OR" } ], "operator": "AND" } ]