Synopsis
The version of Cisco Unity Connection installed on the remote host is affected by multiple denial of service vulnerabilities.
Description
The version of Cisco Unity Connection installed on the remote host is 8.5 prior to 8.5(1)SU7 / 8.6 prior to 8.6(2a)SU4 / 9.x prior to 9.1(2)SU2 / 10.x prior to 10.0(1)SU1. It is, therefore, affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists in the Connection Conversation Manager (CuCsMgr) due to incorrect processing of specific UDP packets. An unauthenticated, remote attacker can exploit this issue by sending a specific UDP packet to the configured SIP trunk, resulting in the closure of the SIP port and the inability to process any further calls.
(CVE-2015-0612)
- A denial of service vulnerability exists in the Connection Conversation Manager (CuCsMgr) due to incorrect processing of SIP INVITE messages. An unauthenticated, remote attacker can exploit this, via specially crafted SIP INVITE messages, to trigger a core dump of the CuCsMgr process. (CVE-2015-0613)
- A denial of service vulnerability exists in the Connection Conversation Manager (CuCsMgr) due to incorrect processing of SIP INVITE messages. An unauthenticated, remote attacker can exploit this, via specially crafted SIP INVITE messages, to trigger a core dump of the CuCsMgr process. (CVE-2015-0614)
- A denial of service vulnerability exists in the SIP call handling code due to a failure to release allocated resources under specific connection scenarios. An unauthenticated, remote attacker can exploit this issue by abnormally terminating a SIP session, resulting in the consumption of all available SIP ports thus preventing further connections. (CVE-2015-0615)
- A denial of service vulnerability exists in the Connection Conversation Manager (CuCsMgr) due to improper handling of incorrectly terminated SIP conversations. An unauthenticated, remote attacker can exploit this issue by abnormally terminating a SIP connection, triggering a core dump of the CuCsMgr process. (CVE-2015-0616)
Note that Cisco bug ID CSCuh25062 (CVE-2015-0612) does not affect the 10.0.x branch.
Further note that Cisco bug ID CSCuh25062 (CVE-2015-0612) is corrected in version 8.5(1)SU6 for the 8.5.x branch. However, version 8.5(1)SU6 is still affected by the other vulnerabilities.
Solution
Upgrade to Cisco Unity Connection 8.5(1)SU7 / 8.6(2a)SU4 / 9.1(2)SU2 / 10.0(1)SU1 or later.
Plugin Details
File Name: cisco_uc_cisco-sa-20150401-cuc.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C
Vulnerability Information
CPE: cpe:/a:cisco:unity_connection
Required KB Items: Host/Cisco/Unity_Connection/Version
Exploit Ease: No known exploits are available
Patch Publication Date: 4/1/2015
Vulnerability Publication Date: 4/1/2015