Thursday, October 8, 2009

CERT-In Vulnerability Note CIVN-2009-117

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Unified Communications Manager Express Vulnerability
http://www.cert-in.org.in/vulnerability/civn-2009-117.htm
Original Issue Date: October 07, 2009

Severity Rating:High

Systems Affected

Cisco IOS Devices that are configured for Cisco Unified Communication
Manager Express and the Extension Mobility feature, are found vulnerable.


Overview

Cisco IOS Software contains a vulnerability that could allow an
unauthenticated, remote attacker to cause a denial of service condition or
execute arbitrary code.

Description

Cisco Unified CME is the call processing component of an enhanced IP
telephony solution that is integrated into Cisco IOS.

The vulnerability is in the login service of the Extension Mobility feature
of the Cisco Unified CME component.  If auto registration feature is
enabled (enabled by default) an attacker can register its IP address and
subsequently send crafted HTTP requests to the login service of the
Extension Mobility feature that could trigger a buffer overflow and leads
either a denial of service condition ( DoS) or execute arbitrary code with
elevated privileges.

Solution

The vendor has issued a fix. Details are available at Cisco Security
Advisory

Vendor Information

CISCO
http://www.cisco.com/warp/public/707/cisco-sa-20090923-cme.shtml

References

CISCO
http://www.cisco.com/warp/public/707/cisco-sa-20090923-cme.shtml

VUPEN
http://www.vupen.com/english/advisories/2009/2758

SecurityFocus
http://www.securityfocus.com/bid/36498/

SecurityTracker
http://securitytracker.com/alerts/2009/Sep/1022932.html

CVE Name
CVE-2009-2865

Disclaimer

The information provided herein is on "as is" basis, without warranty of
any kind.

Contact Information


Phone: +91-11-24368572

Postal address

Indian Computer Emergency Response Team (CERT-In)
Ministry of Communications and Information Technology
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003

Note: Please do not reply to this e-mail. For further queries contact
CERT-In Information Desk. Email: info@cert-in.org.in


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wsBVAwUBSsyBcnWXeYNsoT30AQph1Qf/R1rKDIwbU+A1xXx3v4FWtQLOCSzcdj+H
vhX3sIQpy+tY9z+Je6FogtnqDj42jKywpnlGSmNJfy2sy4yGh10ZX13Fa7NCoWwT
62IhSayuZ+xgN5ECA9yHqX4oCld7N91RcZI/H7haSD3PYoz0y1syZsbkhT3pRLJQ
rSRk+LSi9C7Z6ilVvRXW0W0ftR4oy14Q/iWc8JWmB8l4mhs6dUu2gnahe0C32KUZ
qG6+wkvJhKRAlov31Hhg8aHaJpyz/UFhMLwhoP78/LLQFP0V42e6jHIQCwqcHy8V
trVtnsyzHK6CX4GdpE9SwuCUQ/bFoSu75PUNU5QGF9i/FODC2erd7w==
=fXno
-----END PGP SIGNATURE-----

No comments: