A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106909 | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos | Vendor Advisory |
http://www.securityfocus.com/bid/106909 | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.8 |
References | () http://www.securityfocus.com/bid/106909 - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos - Vendor Advisory |
Information
Published : 2019-02-08 18:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1676
Mitre link : CVE-2019-1676
CVE.ORG link : CVE-2019-1676
JSON object : View
Products Affected
cisco
- meeting_server
CWE
CWE-20
Improper Input Validation