what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ciscoCallManager.txt

ciscoCallManager.txt
Posted Jul 21, 2005
Authored by Jeff Fay | Site patchadvisor.com

The Cisco Call Manager versions 3.2 and below may restart when more than 1 gigabyte of memory is used. Sending specially crafted packets to the CCM will cause the CCM to use more than 1 gigabyte of virtual memory.

tags | advisory
systems | cisco
SHA-256 | a73577718b6c44a7e301e85575188a29e2d59b9366f6093c8b2ffcfac3022c66

ciscoCallManager.txt

Change Mirror Download
PatchAdvisor, Inc.            www.patchadvisor.com

PATCHADVISOR VULNERABILITY ALERT

Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability


VULNERABILITY NAME
==================
Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability

PUBLISHED DATE
==============
12-JUL-05

UPDATED DATE
============
19-JUL-05


BACKGROUND
==========
Cisco Call Manager (CCM) is the software-based call-processing component of the
Cisco IP telephony solution which extends enterprise telephony features and
functions to packet telephony network devices such as IP phones, media processing
devices, voice-over-IP (VoIP) gateways, and multimedia applications.

More information about the product is available here:
http://www.cisco.com/en/US/products/sw/voicesw/ps556/index.html

DESCRIPTION
===========
Cisco Call Manager may restart when more than 1GB of memory is used. Sending
specially crafted packets to the CCM will cause the CCM to use more than 1 gigabyte
of virtual memory.

An example of how to send a specially crafted packet is:

wget http://victim:2000

Cisco has allocated CSCee00116 for this vulnerability. Their bulletin is available here:
http://www.cisco.com/warp/public/707/cisco-sa-20050712-ccm.shtml

IMPACT
======
Successful exploitation of the vulnerability may result in resource starvation resulting
in high CPU utilization, unresponsive terminal services, the inability to run CCM
Admin or to map drives. This may subsequently lead to phones not responding, phones
unregistering from the Cisco CallManager, or Cisco CallManager restarting. In
extreme examples, all VoIP phones may restart after only 1 packet being sent to the
CCM.

VERSIONS AFFECTED
=================
Cisco CallManager 3.2 and earlier
Cisco CallManager 3.3, versions earlier than 3.3(5)
Cisco CallManager 4.0, versions earlier than 4.0(2a)SR2b
Cisco CallManager 4.1, versions earlier than 4.1(3)SR1

SOLUTION
========
Upgrade to version Call Manager 3.3(5) or 4.1(4)

Vulnerability History
=====================
21 April 2005 Identified by Jeff Fay of PatchAdvisor
21 April 2005 Issue disclosed to Cisco
25 April 2005 Vulnerability confirmed Cisco
12 July 2005 Cisco Public Disclosure

UPDATES
=======

Further updates to this notice will be posted to the PatchAdvisor site http://www.patchadvisor.com

CREDIT
======
Jeff Fay of PatchAdvisor (Jeff@patchadvisor.com)

ABOUT PATCHADVISOR
==================
PatchAdvisor, Inc. was founded in 2003 and is based in Alexandria, Virginia with
offices in Maryland and Florida. Our corporate philosophy is simple, we empower
clients with the knowledge and tools they need to secure their environment. Our
products and services go beyond the rest by providing not only an understanding of
security issues, but also providing lasting solutions tailored for each unique
environment so clients can quickly focus on the task of securing their environment.

Request a free trial of our vulnerability alerting solution by clicking here:
http://www.patchadvisor.com/Products/Default.aspx

DISCLAIMER
==========

This information is provided in an AS IS condition and may change without notice. There are no warranties with regard to this information. Neither PatchAdvisor nor the author are liable for any consequences arising from either following or not following this information.



Copyright 2005 PatchAdvisor Inc. All rights reserved. www.patchadvisor.com
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close