Secunia Security Advisory - A vulnerability and a security issue have been reported in Cisco Unified Communications Manager, which can be exploited by malicious people to bypass certain security restrictions or to cause a DoS (Denial of Service).
0d99131f94d1a1f8cb10b8b8ca695ff0ee1e2f267b0c8344cb05139a505c2740
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
Cisco Unified Communications Manager Authentication Bypass and Denial
of Service
SECUNIA ADVISORY ID:
SA30848
VERIFY ADVISORY:
http://secunia.com/advisories/30848/
CRITICAL:
Less critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information, DoS
WHERE:
>From local network
REVISION:
1.1 originally posted 2008-06-26
SOFTWARE:
Cisco Unified CallManager 4.x
http://secunia.com/product/12534/
Cisco Unified Communications Manager 4.x
http://secunia.com/product/5363/
Cisco Unified Communications Manager 5.x
http://secunia.com/product/11019/
Cisco Unified Communications Manager 6.x
http://secunia.com/product/14776/
Cisco Unified CallManager 5.x
http://secunia.com/product/12535/
DESCRIPTION:
A vulnerability and a security issue have been reported in Cisco
Unified Communications Manager, which can be exploited by malicious
people to bypass certain security restrictions or to cause a DoS
(Denial of Service).
1) An unspecified error in the Computer Telephony Integration (CTI)
Manager service can be exploited to cause a DoS by sending a
specially crafted packet to port 2748/TCP.
2) A security issue exists in the Real-Time Information Server (RIS)
Data Collector service, which can be exploited to bypass
authentication checks and disclose e.g. information about performance
statistics, user names, and configured IP phones.
The vulnerability and the security issue affect the following
products and versions:
* Cisco Unified CallManager 4.1 versions
* Cisco Unified Communications Manager 4.2 versions prior to
4.2(3)SR4
* Cisco Unified Communications Manager 4.3 versions prior to
4.3(2)SR1
* Cisco Unified Communications Manager 5.x versions prior to 5.1(3c)
* Cisco Unified Communications Manager 6.x versions prior to 6.1(2)
SOLUTION:
Cisco Unified Communications Manager (CUCM) version 4.1:
Upgrade to 4.2(3)SR4.
Cisco Unified Communications Manager (CUCM) version 4.2:
Update to 4.2(3)SR4.
Cisco Unified Communications Manager (CUCM) version 4.3:
Update to 4.3(2)SR1 (available approximately mid-July 2008)
Cisco Unified Communications Manager (CUCM) version 5.1:
Update to 5.1(3c).
Cisco Unified Communications Manager (CUCM) version 6.1:
Update to CUCM version 6.1(2).
PROVIDED AND/OR DISCOVERED BY:
VoIPshield
CHANGELOG:
2008-06-26: Added links to VoIPshield.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20080625-cucm.shtml
VoIPshield:
http://www.voipshield.com/research-details.php?id=64
http://www.voipshield.com/research-details.php?id=65
http://www.voipshield.com/research-details.php?id=66
http://www.voipshield.com/research-details.php?id=67
http://www.voipshield.com/research-details.php?id=68
http://www.voipshield.com/research-details.php?id=69
http://www.voipshield.com/research-details.php?id=70
http://www.voipshield.com/research-details.php?id=71
http://www.voipshield.com/research-details.php?id=72
http://www.voipshield.com/research-details.php?id=73
http://www.voipshield.com/research-details.php?id=74
http://www.voipshield.com/research-details.php?id=75
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------