First published: Fri Apr 03 2015(Updated: )
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul20444.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =8.5\(1\) | |
Cisco Unity Connection | =8.5\(1\)su1 | |
Cisco Unity Connection | =8.5\(1\)su2 | |
Cisco Unity Connection | =8.5\(1\)su3 | |
Cisco Unity Connection | =8.5\(1\)su4 | |
Cisco Unity Connection | =8.5\(1\)su5 | |
Cisco Unity Connection | =8.5\(1\)su6 | |
Cisco Unity Connection | =8.5_base | |
Cisco Unity Connection | =8.6\(1\) | |
Cisco Unity Connection | =8.6\(1a\) | |
Cisco Unity Connection | =8.6\(2\) | |
Cisco Unity Connection | =8.6\(2a\) | |
Cisco Unity Connection | =8.6\(2a\)su1 | |
Cisco Unity Connection | =8.6\(2a\)su2 | |
Cisco Unity Connection | =8.6\(2a\)su3 | |
Cisco Unity Connection | =8.6_base | |
Cisco Unity Connection | =9.0\(1\) | |
Cisco Unity Connection | =9.1\(1\) | |
Cisco Unity Connection | =9.1\(2\) | |
Cisco Unity Connection | =10.0.0 | |
Cisco Unity Connection | =10.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.