Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Expressway Series and TelePresence VCS Denial of Service Vulnerability

cisco-sa-20170125-expressway · High · Published · Updated

A vulnerability in the received packet parser of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) software could allow an unauthenticated, remote attacker to cause a reload of the affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient size validation of user-supplied data. An attacker could exploit this vulnerability by sending crafted H.224 data in Real-Time Transport Protocol (RTP) packets in an H.323 call. An exploit could allow the attacker to overflow a buffer in a cache that belongs to the received packet parser, which will result in a crash of the application, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-expressway

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2017-3790
Cisco Bug IDsCSCus99263
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco TelePresence Video Communication Server (VCS), Cisco Expressway

Related Products

Product CVE Evidence
Cisco TelePresence Video Communication Server (VCS) CVE-2017-3790 Cisco OpenVuln
Cisco TelePresence CVE-2017-3790 Cisco OpenVuln
Cisco Expressway CVE-2017-3790 Cisco OpenVuln