Vulnerabilities > CVE-2013-3460 - Resource Management Errors vulnerability in Cisco Unified Communications Manager

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Memory leak in Cisco Unified Communications Manager (Unified CM) 8.5(x) before 8.5(1)su6, 8.6(x) before 8.6(2a)su3, and 9.x before 9.1(1) allows remote attackers to cause a denial of service (service disruption) via a high rate of UDP packets, aka Bug ID CSCub85597.

Common Weakness Enumeration (CWE)

Nessus

NASL familyCISCO
NASL idCISCO_CUCM_CSCUB85597.NASL
descriptionAccording to its self-reported version, the remote Cisco Unified Communications Manager (CUCM) device insufficiently limits the rate of traffic on certain UDP ports, allowing a remote attacker to cause a denial of service condition by sending UDP packets at a high rate.
last seen2020-06-01
modified2020-06-02
plugin id70090
published2013-09-24
reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/70090
titleCisco Unified Communications Manager UDP Memory Leak DoS (CSCub85597)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(70090);
  script_version("1.9");
  script_cvs_date("Date: 2018/11/15 20:50:20");

  script_cve_id("CVE-2013-3460");
  script_bugtraq_id(61909);
  script_xref(name:"CISCO-BUG-ID", value:"CSCub85597");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20130821-cucm");

  script_name(english:"Cisco Unified Communications Manager UDP Memory Leak DoS (CSCub85597)");
  script_summary(english:"Checks the version of Cisco Unified Communications Manager (CUCM).");

    script_set_attribute(attribute:"synopsis", value:"The remote host is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the remote Cisco Unified
Communications Manager (CUCM) device insufficiently limits the rate of
traffic on certain UDP ports, allowing a remote attacker to cause a
denial of service condition by sending UDP packets at a high rate.");
  # https://tools.cisco.com/security/center/viewAlert.x?alertId=30432
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e62929fa");

  script_set_attribute(attribute:"solution", value:
"For Cisco Unified Communications Manager (CUCM) 8.5(x), upgrade to
version 8.5(1)su6 or later. For 8.6(x), upgrade to 8.6(2a)su3 or
later. For 9.x, upgrade to 9.1(2) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/08/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/08/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/24");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:unified_communications_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");

  script_dependencies("cisco_ucm_detect.nbin");
  script_require_keys("Host/Cisco/CUCM/Version", "Host/Cisco/CUCM/Version_Display");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

ver         = get_kb_item_or_exit("Host/Cisco/CUCM/Version");
ver_display = get_kb_item_or_exit("Host/Cisco/CUCM/Version_Display");

app_name  = "Cisco Unified Communications Manager (CUCM)";
fixed_ver = NULL;

if (ver =~ "^8\.5\." && ver_compare(ver:ver, fix:"8.5.1.16900.6", strict:FALSE) < 0)
  fixed_ver = "8.5(1)su6";
else if (ver =~ "^8\.6\." && ver_compare(ver:ver, fix:"8.6.2.23900.10", strict:FALSE) < 0)
  fixed_ver = "8.6(2a)su3";
# Cisco's recommended version differs from the first fixed version.
# We check against the first fix, but recommend what Cisco recommends
# if the target is found vulnerable.
else if (ver =~ "^9\." && ver_compare(ver:ver, fix:"9.1.1.10000.36", strict:FALSE) < 0)
  fixed_ver = "9.1(2)";
else
  audit(AUDIT_INST_VER_NOT_VULN, "Cisco Unified Call Management (CUCM)", ver_display);

report = NULL;
if (report_verbosity > 0)
{
  # We give the version numbers with the in-house build number.
  report =
    '\n  Cisco bug ID      : CSCub85597'     +
    '\n  Installed release : ' + ver_display +
    '\n  Fixed release     : ' + fixed_ver   +
    '\n';

  security_hole(port:0, extra:report);
}
else security_hole(0);