Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software

Published: 2014-10-15
Last Updated: 2014-10-15 19:10:13 UTC
by Basil Alawi S.Taher (Version: 1)
0 comment(s)

Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software
Advisory ID: cisco-sa-20141015-vcs

Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Software includes the following vulnerabilities:
•    Cisco TelePresence VCS and Cisco Expressway Crafted Packets Denial of Service Vulnerability
•    Cisco TelePresence VCS and Cisco Expressway SIP IX Filter Denial of Service Vulnerability
•    Cisco TelePresence VCS and Cisco Expressway SIP Denial of Service Vulnerability
Succesfull exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to cause a reload of the affected system, which may result in a Denial of Service (DoS) condition.

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs

Note: This security advisory does not provide information about the GNU Bash Environment Variable Command Injection Vulnerability (also known as Shellshock). For additional information regarding Cisco products affected by this vulnerability, refer to the Cisco Security Advisory at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash



 

Keywords:
0 comment(s)

Comments


Diary Archives