Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the received packet parser of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) software could allow an unauthenticated, remote attacker to cause a reload of the affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient size validation of user-supplied data. An attacker could exploit this vulnerability by sending crafted H.224 data in Real-Time Transport Protocol (RTP) packets in an H.323 call. An exploit could allow the attacker to overflow a buffer in a cache that belongs to the received packet parser, which will result in a crash of the application, resulting in a DoS condition. All versions of Cisco Expressway Series Software and Cisco TelePresence VCS Software prior to version X8.8.2 are vulnerable. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCus99263.
CVSS Information
N/A
Vulnerability Type
资源管理错误
Vulnerability Title
Cisco Expressway Series Software和Cisco TelePresence VCS Software 安全漏洞
Vulnerability Description
Cisco Expressway Series Software和Cisco TelePresence VCS Software都是美国思科(Cisco)公司的网真视频通信服务器,它能够与统一通信和语音通信环境集成,从而为使用各种通信工具的最终用户提供最佳体验。 Cisco Expressway Series Software和Cisco TelePresence VCS Software X8.8.2之前的版本中存在安全漏洞,该漏洞源于程序没有充分的验证用户提供数据的大小。远程攻击者可利用该漏洞造成拒绝
CVSS Information
N/A
Vulnerability Type
N/A