Cisco TelePresence TC and TE Software Multiple Vulnerabilities (cisco-sa-20140430-tcte)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The version of Cisco TelePresence TC or TE software running on the
remote host is affected by one or more of the following issues :

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2162 / CSCud29566)

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2163 / CSCua64961)

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2164 / CSCuj94651)

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2165 / CSCtq72699)

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2166 / CSCto70562)

- A denial of service vulnerability exists due to a flaw
in the SIP implementation, potentially allowing a remote
attacker to cause a device reload by sending crafted SIP
packets. (CVE-2014-2167 / CSCua86589)

- A remote code execution vulnerability exists due to a
buffer overflow in Cisco TelePresence TC and TE
software, potentially allowing a remote attacker to
execute arbitrary code by sending crafted DNS response
packets. (CVE-2014-2168 / CSCty44804)

- A remote command execution vulnerability exists due to
a failure to sanitize user-supplied input to internal
scripts, potentially allowing an authenticated attacker
to execute arbitrary commands. (CVE-2014-2169 /
CSCue60211)

- A remote command execution vulnerability exists due to
a failure to sanitize user-supplied input to tshell
scripts, potentially allowing an authenticated attacker
to execute arbitrary commands. (CVE-2014-2170 /
CSCue60202)

- A remote code execution vulnerability exists that
potentially allows remote attackers to execute arbitrary
code via crafted SIP packets. (CVE-2014-2171 /
CSCud81796)

- A privilege escalation vulnerability exists due to a
buffer overflow in Cisco TelePresence TC and TE
software, potentially allowing local attackers to gain
privileges. (CVE-2014-2172 / CSCub67693)

- A privilege escalation vulnerability exists due to
improperly restricting access to the serial port,
potentially allowing local attackers to gain privileges
via unspecified commands. (CVE-2014-2173 / CSCub67692)

- A denial of service vulnerability exists that
potentially allows remote attackers to trigger memory
consumption via crafted H.225 packets.
(CVE-2014-2175 / CSCtq78849)

See also :

http://www.nessus.org/u?6abd1d7e

Solution :

Upgrade to the relevant Cisco TelePresence TC or TE software version
referenced in Cisco Security Advisory cisco-sa-20140430-tcte.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false