First published: Fri Apr 03 2015(Updated: )
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul20444.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =8.5\(1\) | |
Cisco Unity Connection | =8.5\(1\)su1 | |
Cisco Unity Connection | =8.5\(1\)su2 | |
Cisco Unity Connection | =8.5\(1\)su3 | |
Cisco Unity Connection | =8.5\(1\)su4 | |
Cisco Unity Connection | =8.5\(1\)su5 | |
Cisco Unity Connection | =8.5\(1\)su6 | |
Cisco Unity Connection | =8.5_base | |
Cisco Unity Connection | =8.6\(1\) | |
Cisco Unity Connection | =8.6\(1a\) | |
Cisco Unity Connection | =8.6\(2\) | |
Cisco Unity Connection | =8.6\(2a\) | |
Cisco Unity Connection | =8.6\(2a\)su1 | |
Cisco Unity Connection | =8.6\(2a\)su2 | |
Cisco Unity Connection | =8.6\(2a\)su3 | |
Cisco Unity Connection | =8.6_base | |
Cisco Unity Connection | =9.0\(1\) | |
Cisco Unity Connection | =9.1\(1\) | |
Cisco Unity Connection | =9.1\(2\) | |
Cisco Unity Connection | =10.0.0 | |
Cisco Unity Connection | =10.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0613 has a high severity rating due to its potential to enable remote denial of service attacks.
To fix CVE-2015-0613, upgrade to the latest patched version of Cisco Unity Connection.
CVE-2015-0613 affects Cisco Unity Connection versions prior to 8.5(1)SU7, 8.6(2a)SU4, 9.1(2)SU2, and 10.0(1)SU1.
CVE-2015-0613 enables remote attackers to cause a denial of service via a malformed SIP request.
There is no documented workaround for CVE-2015-0613; the best mitigation is to apply the appropriate software updates.