Lucene search

K
nessusThis script is Copyright (C) 2013-2022 Tenable Network Security, Inc.CISCO_CUCM_CSCUD54358.NASL
HistorySep 24, 2013 - 12:00 a.m.

Cisco Unified Communications Manager Remote Buffer Overflow (CSCud54358)

2013-09-2400:00:00
This script is Copyright (C) 2013-2022 Tenable Network Security, Inc.
www.tenable.com
14

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.012

Percentile

84.9%

According to its self-reported version, the remote Cisco Unified Communications Manager (CUCM) device is affected by a remote buffer overflow vulnerability that allows an authenticated, remote attacker to corrupt data, disrupt services, or execute arbitrary commands.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(70091);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2013-3462");
  script_bugtraq_id(61913);
  script_xref(name:"CISCO-BUG-ID", value:"CSCud54358");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20130821-cucm");

  script_name(english:"Cisco Unified Communications Manager Remote Buffer Overflow (CSCud54358)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a remote buffer overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the remote Cisco Unified
Communications Manager (CUCM) device is affected by a remote buffer
overflow vulnerability that allows an authenticated, remote attacker
to corrupt data, disrupt services, or execute arbitrary commands.");
  # https://tools.cisco.com/security/center/viewAlert.x?alertId=30434
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?22428f81");
  script_set_attribute(attribute:"solution", value:
"For Cisco Unified Communications Manager (CUCM) 7.1(x), upgrade to
version 7.1(5b)su6 or later. For 8.5(x), upgrade to version 8.5(1)su6
or later. For 8.6(x), upgrade to 8.6(2a)su3 or later. For 9.x, upgrade
to 9.1(2) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/08/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/08/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/24");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:unified_communications_manager");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2013-2022 Tenable Network Security, Inc.");

  script_dependencies("cisco_ucm_detect.nbin");
  script_require_keys("Host/Cisco/CUCM/Version", "Host/Cisco/CUCM/Version_Display");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

ver         = get_kb_item_or_exit("Host/Cisco/CUCM/Version");
ver_display = get_kb_item_or_exit("Host/Cisco/CUCM/Version_Display");

app_name  = "Cisco Unified Communications Manager (CUCM)";
fixed_ver = NULL;

if (ver =~ "^7\.1\." && ver_compare(ver:ver, fix:"7.1.5.35900", strict:FALSE) < 0)
  fixed_ver = "7.1(5b)su6";
# The fix exist in name only, so we compare to the last broken (8.5(1)SU5).
else if (ver =~ "^8\.5\." && ver_compare(ver:ver, fix:"8.5.1.15900", strict:FALSE) <= 0)
  fixed_ver = "8.5(1)su6";
else if (ver =~ "^8\.6\." && ver_compare(ver:ver, fix:"8.6.2.23900", strict:FALSE) < 0)
  fixed_ver = "8.6(2a)su3";
else if (ver =~ "^9\." && ver_compare(ver:ver, fix:"9.1.2.10000", strict:FALSE) < 0)
  fixed_ver = "9.1(2)";
else
  audit(AUDIT_INST_VER_NOT_VULN, app_name, ver_display);

report = NULL;
if (report_verbosity > 0)
{
  report =
    '\n  Cisco bug ID      : CSCub35869'     +
    '\n  Installed release : ' + ver_display +
    '\n  Fixed release     : ' + fixed_ver   +
    '\n';
  security_hole(port:0, extra:report);
}
else security_hole(0);

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.012

Percentile

84.9%

Related for CISCO_CUCM_CSCUD54358.NASL