Cisco Unified Communications Manager Remote Buffer Overflow (CSCus66650) (GHOST)

Critical Nessus Plugin ID 81546


The remote device is affected by a buffer overflow vulnerability.


According to its self-reported version, the remote Cisco Unified Communications Manager (CUCM) device is affected by a heap-based buffer overflow in the GNU C Library (glibc) due to improperly validating user-supplied input in the glibc functions
__nss_hostname_digits_dots(), gethostbyname(), and gethostbyname2().
This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.


Apply the relevant patch referenced in the Cisco bug advisory.

See Also

Plugin Details

Severity: Critical

ID: 81546

File Name: cisco_cucm_CSCus66650-GHOST.nasl

Version: 1.14

Type: combined

Family: CISCO

Published: 2015/02/26

Updated: 2019/11/25

Dependencies: 80282

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2015-0235

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:unified_communications_manager

Required KB Items: Host/Cisco/CUCM/Version, Host/Cisco/CUCM/Version_Display

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/02/24

Vulnerability Publication Date: 2015/01/12

Exploitable With

Core Impact

Metasploit (Exim GHOST (glibc gethostbyname) Buffer Overflow)

Reference Information

CVE: CVE-2015-0235

BID: 72325


CERT: 967332