First published: Fri May 02 2014(Updated: )
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to execute arbitrary code via crafted DNS response packets, aka Bug ID CSCty44804.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence TE Software | =4.1.0 | |
Cisco TelePresence TE Software | =4.1.1 | |
Cisco TelePresence TE Software | =4.1.2 | |
Cisco TelePresence TE Software | =4.1.3 | |
Cisco TelePresence TE Software | =6.0 | |
Cisco TelePresence TC | =4.0.0 | |
Cisco TelePresence TC | =4.0.1 | |
Cisco TelePresence TC | =4.0.4 | |
Cisco TelePresence TC | =4.1.1 | |
Cisco TelePresence TC | =4.1.2 | |
Cisco TelePresence TC | =4.2.0 | |
Cisco TelePresence TC | =4.2.1 | |
Cisco TelePresence TC | =4.2.2 | |
Cisco TelePresence TC | =4.2.3 | |
Cisco TelePresence TC | =4.2.4 | |
Cisco TelePresence TC | =5.0.0 | |
Cisco TelePresence TC | =5.0.1 | |
Cisco TelePresence TC | =5.0.2 | |
Cisco TelePresence TC | =5.1.0 | |
Cisco TelePresence TC | =5.1.1 | |
Cisco TelePresence TC | =5.1.2 | |
Cisco TelePresence TC | =5.1.3 | |
Cisco TelePresence TC | =5.1.4 | |
Cisco TelePresence TC | =5.1.5 | |
Cisco TelePresence TC | =5.1.6 | |
Cisco TelePresence TC | =5.1.7 | |
=4.1.0 | ||
=4.1.1 | ||
=4.1.2 | ||
=4.1.3 | ||
=6.0 | ||
=4.0.0 | ||
=4.0.1 | ||
=4.0.4 | ||
=4.1.1 | ||
=4.1.2 | ||
=4.2.0 | ||
=4.2.1 | ||
=4.2.2 | ||
=4.2.3 | ||
=4.2.4 | ||
=5.0.0 | ||
=5.0.1 | ||
=5.0.2 | ||
=5.1.0 | ||
=5.1.1 | ||
=5.1.2 | ||
=5.1.3 | ||
=5.1.4 | ||
=5.1.5 | ||
=5.1.6 | ||
=5.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2168 is rated as high severity due to its potential to allow remote code execution.
To mitigate CVE-2014-2168, update your Cisco TelePresence TC Software or TE Software to a patched version provided by Cisco.
CVE-2014-2168 affects Cisco TelePresence TC Software versions 4.x, 5.x and TE Software versions 4.x, 6.0.
CVE-2014-2168 enables remote attackers to execute arbitrary code via crafted DNS response packets.
There are no specific workarounds for CVE-2014-2168; applying updates from Cisco is the recommended solution.