ID

VAR-200810-0357


CVE

CVE-2008-4543


TITLE

Cisco Unity Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-002359

DESCRIPTION

Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to cause a denial of service (session exhaustion) via a large number of connections. Cisco Unity is prone to multiple remote vulnerabilities, including: - An information-disclosure vulnerability in the web interface - A denial-of-service vulnerability in the administration interface - A script-injection vulnerability in the web interface - Multiple denial-of-service vulnerabilities in unspecified services These issues are reported in Cisco Unity 7.0; other versions may also be affected. Cisco Unity is a voice and unified messaging platform. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Cisco Unity Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32187 VERIFY ADVISORY: http://secunia.com/advisories/32187/ CRITICAL: Less critical IMPACT: Security Bypass, Exposure of sensitive information, DoS WHERE: >From local network SOFTWARE: Cisco Unity 4.x http://secunia.com/advisories/product/4386/ Cisco Unity 5.x http://secunia.com/advisories/product/20082/ Cisco Unity 7.x http://secunia.com/advisories/product/20083/ DESCRIPTION: Some vulnerabilities and a security issue have been reported in Cisco Unity, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error exists within the authentication process in the Cisco Unity server, which can be exploited to bypass the authentication mechanism and view or modify certain system configuration parameters. 2) An error in the session handling in the Cisco Unity server can be exploited to cause a DoS by exhausting all available sessions. Successful exploitation of these vulnerabilities requires that the Cisco Unity server is configured for anonymous authentication (not the default configuration). 3) A security issue is caused due to insecure permissions on "\CommServer\Reports", which can be exploited by domain users to disclose potentially sensitive information. SOLUTION: Update to version 4.0ES161, 5.0ES53, or 7.0ES8. http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=274246502 PROVIDED AND/OR DISCOVERED BY: VoIPshield Systems ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20081008-unity.shtml http://www.cisco.com/warp/public/707/cisco-sr-20081008-unity.shtml VoIPshield: http://www.voipshield.com/research-details.php?id=126&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=DESC http://www.voipshield.com/research-details.php?id=128&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=DESC http://www.voipshield.com/research-details.php?id=130&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=DESC ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2008-4543 // JVNDB: JVNDB-2008-002359 // BID: 31642 // VULHUB: VHN-34668 // VULMON: CVE-2008-4543 // PACKETSTORM: 70765

AFFECTED PRODUCTS

vendor:ciscomodel:unityscope:eqversion:7.0

Trust: 1.9

vendor:ciscomodel:unityscope:eqversion:4.0

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:5.0

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(3\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(4\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(5\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.1\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:5.0\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:7.0\(2\)

Trust: 1.0

vendor:ciscomodel:unityscope:eqversion:4.0\(2\)

Trust: 1.0

vendor:ciscomodel:unityscope:eqversion:4.0\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:ltversion:4.2(1)es161

Trust: 0.8

vendor:ciscomodel:unityscope:ltversion:5.0(1)es53

Trust: 0.8

vendor:ciscomodel:unityscope:ltversion:7.0(2)es8

Trust: 0.8

vendor:ciscomodel:unityscope:eqversion:7.0\(2\)

Trust: 0.6

vendor:ciscomodel:unityscope:eqversion:5.0\(1\)

Trust: 0.6

vendor:ciscomodel:unityscope:eqversion:4.2\(1\)

Trust: 0.6

vendor:ciscomodel:unity es8scope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:unity es53scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:unity es161scope:eqversion:4.0

Trust: 0.3

sources: BID: 31642 // JVNDB: JVNDB-2008-002359 // CNNVD: CNNVD-200810-183 // NVD: CVE-2008-4543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4543
value: HIGH

Trust: 1.0

NVD: CVE-2008-4543
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200810-183
value: HIGH

Trust: 0.6

VULHUB: VHN-34668
value: HIGH

Trust: 0.1

VULMON: CVE-2008-4543
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-4543
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-34668
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-34668 // VULMON: CVE-2008-4543 // JVNDB: JVNDB-2008-002359 // CNNVD: CNNVD-200810-183 // NVD: CVE-2008-4543

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-34668 // JVNDB: JVNDB-2008-002359 // NVD: CVE-2008-4543

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200810-183

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200810-183

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002359

PATCH

title:107983url:http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-002359

EXTERNAL IDS

db:NVDid:CVE-2008-4543

Trust: 2.9

db:BIDid:31642

Trust: 2.1

db:SECUNIAid:32187

Trust: 1.9

db:SECTRACKid:1021013

Trust: 1.7

db:VUPENid:ADV-2008-2771

Trust: 1.7

db:JVNDBid:JVNDB-2008-002359

Trust: 0.8

db:XFid:45743

Trust: 0.6

db:CISCOid:20081008 VOIPSHIELD REPORTED VULNERABILITIES IN CISCO UNITY SERVER

Trust: 0.6

db:CNNVDid:CNNVD-200810-183

Trust: 0.6

db:VULHUBid:VHN-34668

Trust: 0.1

db:VUPENid:2008/2771

Trust: 0.1

db:VULMONid:CVE-2008-4543

Trust: 0.1

db:PACKETSTORMid:70765

Trust: 0.1

sources: VULHUB: VHN-34668 // VULMON: CVE-2008-4543 // BID: 31642 // JVNDB: JVNDB-2008-002359 // PACKETSTORM: 70765 // CNNVD: CNNVD-200810-183 // NVD: CVE-2008-4543

REFERENCES

url:http://www.securityfocus.com/bid/31642

Trust: 1.8

url:http://www.cisco.com/en/us/products/products_security_response09186a0080a0d861.html

Trust: 1.8

url:http://www.voipshield.com/research-details.php?id=128

Trust: 1.8

url:http://securitytracker.com/id?1021013

Trust: 1.8

url:http://secunia.com/advisories/32187

Trust: 1.8

url:http://www.vupen.com/english/advisories/2008/2771

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45743

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4543

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4543

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/45743

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/2771

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sr-20081008-unity.shtml

Trust: 0.4

url:http://www.voipshield.com/research-details.php?id=130&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.4

url:http://www.voipshield.com/research-details.php?id=128&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.4

url:http://www.cisco.com

Trust: 0.3

url:http://www.voipshield.com/research-details.php?id=129&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.3

url:http://www.voipshield.com/research-details.php?id=127&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=15565

Trust: 0.1

url:http://secunia.com/advisories/product/20082/

Trust: 0.1

url:http://tools.cisco.com/support/downloads/go/redirect.x?mdfid=274246502

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/4386/

Trust: 0.1

url:http://secunia.com/advisories/product/20083/

Trust: 0.1

url:http://www.voipshield.com/research-details.php?id=126&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/32187/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20081008-unity.shtml

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-34668 // VULMON: CVE-2008-4543 // BID: 31642 // JVNDB: JVNDB-2008-002359 // PACKETSTORM: 70765 // CNNVD: CNNVD-200810-183 // NVD: CVE-2008-4543

CREDITS

VoIPshield

Trust: 0.6

sources: CNNVD: CNNVD-200810-183

SOURCES

db:VULHUBid:VHN-34668
db:VULMONid:CVE-2008-4543
db:BIDid:31642
db:JVNDBid:JVNDB-2008-002359
db:PACKETSTORMid:70765
db:CNNVDid:CNNVD-200810-183
db:NVDid:CVE-2008-4543

LAST UPDATE DATE

2025-04-10T23:09:30.978000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-34668date:2017-08-08T00:00:00
db:VULMONid:CVE-2008-4543date:2017-08-08T00:00:00
db:BIDid:31642date:2016-07-05T22:01:00
db:JVNDBid:JVNDB-2008-002359date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200810-183date:2008-12-24T00:00:00
db:NVDid:CVE-2008-4543date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-34668date:2008-10-13T00:00:00
db:VULMONid:CVE-2008-4543date:2008-10-13T00:00:00
db:BIDid:31642date:2008-10-08T00:00:00
db:JVNDBid:JVNDB-2008-002359date:2009-07-08T00:00:00
db:PACKETSTORMid:70765date:2008-10-10T16:17:34
db:CNNVDid:CNNVD-200810-183date:2008-10-13T00:00:00
db:NVDid:CVE-2008-4543date:2008-10-13T20:00:02.370