exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ciscoCallManager.txt

ciscoCallManager.txt
Posted Jul 21, 2005
Authored by Jeff Fay | Site patchadvisor.com

The Cisco Call Manager versions 3.2 and below may restart when more than 1 gigabyte of memory is used. Sending specially crafted packets to the CCM will cause the CCM to use more than 1 gigabyte of virtual memory.

tags | advisory
systems | cisco
SHA-256 | a73577718b6c44a7e301e85575188a29e2d59b9366f6093c8b2ffcfac3022c66

ciscoCallManager.txt

Change Mirror Download
PatchAdvisor, Inc.            www.patchadvisor.com

PATCHADVISOR VULNERABILITY ALERT

Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability


VULNERABILITY NAME
==================
Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability

PUBLISHED DATE
==============
12-JUL-05

UPDATED DATE
============
19-JUL-05


BACKGROUND
==========
Cisco Call Manager (CCM) is the software-based call-processing component of the
Cisco IP telephony solution which extends enterprise telephony features and
functions to packet telephony network devices such as IP phones, media processing
devices, voice-over-IP (VoIP) gateways, and multimedia applications.

More information about the product is available here:
http://www.cisco.com/en/US/products/sw/voicesw/ps556/index.html

DESCRIPTION
===========
Cisco Call Manager may restart when more than 1GB of memory is used. Sending
specially crafted packets to the CCM will cause the CCM to use more than 1 gigabyte
of virtual memory.

An example of how to send a specially crafted packet is:

wget http://victim:2000

Cisco has allocated CSCee00116 for this vulnerability. Their bulletin is available here:
http://www.cisco.com/warp/public/707/cisco-sa-20050712-ccm.shtml

IMPACT
======
Successful exploitation of the vulnerability may result in resource starvation resulting
in high CPU utilization, unresponsive terminal services, the inability to run CCM
Admin or to map drives. This may subsequently lead to phones not responding, phones
unregistering from the Cisco CallManager, or Cisco CallManager restarting. In
extreme examples, all VoIP phones may restart after only 1 packet being sent to the
CCM.

VERSIONS AFFECTED
=================
Cisco CallManager 3.2 and earlier
Cisco CallManager 3.3, versions earlier than 3.3(5)
Cisco CallManager 4.0, versions earlier than 4.0(2a)SR2b
Cisco CallManager 4.1, versions earlier than 4.1(3)SR1

SOLUTION
========
Upgrade to version Call Manager 3.3(5) or 4.1(4)

Vulnerability History
=====================
21 April 2005 Identified by Jeff Fay of PatchAdvisor
21 April 2005 Issue disclosed to Cisco
25 April 2005 Vulnerability confirmed Cisco
12 July 2005 Cisco Public Disclosure

UPDATES
=======

Further updates to this notice will be posted to the PatchAdvisor site http://www.patchadvisor.com

CREDIT
======
Jeff Fay of PatchAdvisor (Jeff@patchadvisor.com)

ABOUT PATCHADVISOR
==================
PatchAdvisor, Inc. was founded in 2003 and is based in Alexandria, Virginia with
offices in Maryland and Florida. Our corporate philosophy is simple, we empower
clients with the knowledge and tools they need to secure their environment. Our
products and services go beyond the rest by providing not only an understanding of
security issues, but also providing lasting solutions tailored for each unique
environment so clients can quickly focus on the task of securing their environment.

Request a free trial of our vulnerability alerting solution by clicking here:
http://www.patchadvisor.com/Products/Default.aspx

DISCLAIMER
==========

This information is provided in an AS IS condition and may change without notice. There are no warranties with regard to this information. Neither PatchAdvisor nor the author are liable for any consequences arising from either following or not following this information.



Copyright 2005 PatchAdvisor Inc. All rights reserved. www.patchadvisor.com
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close