CVE-2013-3461
Published Aug 25, 2013
Last updated 8 years ago
Overview
- Description
- Cisco Unified Communications Manager (Unified CM) 8.5(x) and 8.6(x) before 8.6(2a)su3 and 9.x before 9.1(1) does not properly restrict the rate of SIP packets, which allows remote attackers to cause a denial of service (memory and CPU consumption, and service disruption) via a flood of UDP packets to port 5060, aka Bug ID CSCub35869.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:9.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7285C0D-5337-49D0-A6EE-2385A7B4F510" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E1FA195-A711-4861-9B3D-A36D55C0F49D" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F252947A-82FE-4133-AA4F-E17758D7ECF7" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61E277B-475A-40EC-8A67-CE2A17C94185" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D289E6D8-EA6A-4487-9513-6CCEE3740EA2" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FAA377E-3C37-4E9D-97E7-FDC162CF8FC6" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCEDD1A3-9658-48AF-A59E-A9BE7FA17E13" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06098E0B-20F8-4FCC-A384-01EA108F4549" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCF00D65-DE88-4287-82CB-552AB68AFE25" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47E28290-C7A9-4DF4-9918-6FDF5DC2B3A8" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8B5A9DD-C259-463C-A6A5-51D3E8DD4F58" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B04ECEA-E097-4069-B6AC-74D477F03BF3" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5CCD3E6-6031-437E-862B-470E39FAF67D" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C31335-8001-4C83-A04B-6562CB39E3EC" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70757AD4-8F55-4C8B-886B-1D2E41670407" } ], "operator": "OR" } ] } ]