CVE-2008-1746
Published May 16, 2008
Last updated 7 years ago
Overview
- Description
- The SNMP Trap Agent service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (core dump and service restart) via a series of malformed UDP packets, as demonstrated by the IP Stack Integrity Checker (ISIC), aka Bug ID CSCsj24113.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E29A61E-334B-4F95-9B47-8F53A4DB3EB0" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr.5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBE07ABF-97B2-48B4-8EF6-861AB41340F2" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9135D3DE-5110-47CB-A23F-7CE3D9AFD153" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "914A2B2A-6292-451B-B26A-1B529CECBE3B" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72FAE8F7-504A-4B6F-9C9D-45158AC6C208" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "835DD627-C5F1-4733-8949-C91592EC719A" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2\\(3\\)sr.2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "701A374B-00A7-4151-8652-9A39FAECBC5A" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42F41FF1-3FD1-4E90-877C-AC10D56CFEA8" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "291CFDEC-CDF8-438D-9D1E-2832CE705FB6" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:4.3\\(1\\)sr.1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25EF5BF5-5909-4194-96DD-E8725BD3499A" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(1\\):*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B860F1E1-E295-4B71-B396-14286611EA36" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2\\):*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E194E6EC-282D-4C8E-96E3-00D64FCD8C6C" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2a\\):*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B2EA451-EE18-440A-924A-556A2EC74300" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2b\\):*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8950C510-38F3-4040-8871-C085DDECF5B3" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:\\(1a\\):*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E8F77F9-05C3-4B66-9022-7B227F97978C" } ], "operator": "OR" } ] } ]