Vulnerabilities > CVE-2011-0385 - Unspecified vulnerability in Cisco products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.
Vulnerable Configurations
Nessus
NASL family | CGI abuses |
NASL id | CISCO_TMS_WEB_1_7_0.NASL |
description | According to its self-reported version number, the version of Cisco TelePresence Multipoint Switch running on the remote host is earlier than 1.7.0 and, therefore, has the following vulnerabilities: - Servlets used to perform administrative actions are accessible without authentication. (CVE-2011-0383, CVE-2011-0384, CVE-2011-0387) - Unauthenticated attackers can upload files to arbitrary locations. (CVE-2011-0385) - An unauthenticated attacker on the same network segment could send a malicious Cisco Discovery Protocol packet, resulting in a buffer overflow. (CVE-2011-0379) - Java RMI access is not properly restricted, which could allow an unauthenticated, remote attacker to cause a denial of service. (CVE-2011-0388) - Receiving a malicious RTCP packet could cause the call control process to crash. (CVE-2011-0389) A remote, unauthenticated attacker could potentially exploit the most severe of these vulnerabilities to take complete control of the host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 60139 |
published | 2012-07-27 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/60139 |
title | Cisco TelePresence Multipoint Switch < 1.7.0 Multiple Vulnerabilities (cisco-sa-20110223-telepresence-ctms) |
code |
|
References
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml
- http://www.securitytracker.com/id?1025113
- http://www.securitytracker.com/id?1025114
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65604
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65604
- http://www.securitytracker.com/id?1025114
- http://www.securitytracker.com/id?1025113
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml