Cisco TANDBERG MXP < 9.0 SNMP Packet Handling DoS

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

An application on the remote host is affected by a denial of service
vulnerability.

Description :

The remote host is running TANDBERG MXP Endpoint, an application used
for video conferencing.

According to the version number identified in the telnet banner, the
TANDBERG MXP Endpoint version running on the remote host is less than
F9.0. As such, the install is potentially affected by a remote denial
of service condition as the firmware incorrectly processes Simple
Network Management Protocol (SNMP) packets. A remote, unauthenticated
attacker could exploit this issue by sending a specially crafted SNMP
packet to the affected device causing a denial of service (DoS)
condition.

Note that Nessus did not test for this issue, but rather relied on the
application's self-reported version number.

See also :

http://seclists.org/fulldisclosure/2010/Aug/381
http://tools.cisco.com/security/center/viewAlert.x?alertId=21335
http://www.nessus.org/u?2c78aa44

Solution :

Upgrade to version F9.0 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 69825 ()

Bugtraq ID: 42827

CVE ID: