CVE-2017-3837
Published Feb 22, 2017
Last updated 7 years ago
Overview
- Description
- An HTTP Packet Processing vulnerability in the Web Bridge interface of the Cisco Meeting Server (CMS), formerly Acano Conferencing Server, could allow an authenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. In addition, the attacker could potentially cause the application to crash unexpectedly, resulting in a denial of service (DoS) condition. The attacker would need to be authenticated and have a valid session with the Web Bridge. Affected Products: This vulnerability affects Cisco Meeting Server software releases prior to 2.1.2. This product was previously known as Acano Conferencing Server. More Information: CSCvc89551. Known Affected Releases: 2.0 2.0.7 2.1. Known Fixed Releases: 2.1.2.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C48DC084-1DD2-4878-B1DB-1035CAE3B918" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CA9A904-9AB5-4757-ABD1-0F6F933799BE" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FA8A21E-97BA-4326-9F7B-FCBD480134EF" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E6FA3F5-752D-45AB-A8CB-6488F409D933" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B80C9BA-07EC-4183-9AAD-3229913C9FD7" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B1895DF-AFB1-4B6E-A42C-38F7E19A5842" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BC4BC50-1D9C-42F3-A88F-FE1E2C8A6C76" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA671C18-10F2-4A45-8D1C-BF460ECA84B9" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F618372C-0913-4773-9267-A835F31FA776" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B310B39B-7D5D-4533-9FE6-5F47985E35B0" }, { "criteria": "cpe:2.3:a:cisco:meeting_server:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2720CCF-3B73-4268-94C7-9AE3D1ECAC75" } ], "operator": "OR" } ] } ]