7.8
CWE
400 399
Advisory Published
Updated

CVE-2017-6779

First published: Thu Jun 07 2018(Updated: )

Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable. This vulnerability affects the following Cisco Voice Operating System (VOS)-based products: Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IM&P - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection, Virtualized Voice Browser. This vulnerability also affects Prime Collaboration Assurance and Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818, CSCvi31823.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Emergency Responder>=10.5<10.5\(1a\)
Cisco Emergency Responder>=11.0<11.5\(4\)
Cisco Emergency Responder>=12.0<12.0su1
Cisco Emergency Responder=11.0\(1.10000.10\)
Cisco Finesse>=11.5<11.5\(3\)
Cisco Finesse=9.5\(1\)
Cisco Hosted Collaboration Mediation Fulfillment>=11.5<11.5\(3\)
Cisco Hosted Collaboration Mediation Fulfillment=9.5\(1\)
Cisco MediaSense>=11.5<11.5su2
Cisco MediaSense=9.5\(1\)
Cisco Prime Collaboration Assurance>=11.6<11.6_es16
Cisco Prime Collaboration Assurance>=12.1<12.1_es2
Cisco Prime Collaboration Provisioning=12.5
Cisco Prime License Manager>=10.5<10.5.2
Cisco Prime License Manager>=11.0<11.5\(1\)su5
Cisco SocialMiner>=11.6<11.6.1
Cisco Unified Communications Manager>=10.0<10.5\(2\)su5
Cisco Unified Communications Manager>=11.0<11.0\(1a\)su4
Cisco Unified Communications Manager>=11.5<11.5\(1\)su3
Cisco Unified Communications Manager=10.5\(2.10000.5\)
Cisco Unified Communications Manager=11.0\(1.10000.10\)
Cisco Unified Communications Manager=11.5\(1.10000.6\)
Cisco Unified Communications Manager=12.0
Cisco Unified Contact Center Express>=11.6<11.6\(1\)
Cisco Unified Contact Center Express=9.0\(2\)su1.3
Cisco Unified Intelligence Center>=11.6<11.6\(1\)
Cisco Unified Intelligence Center=9.5\(1\)
Cisco Unity Connection>=10.5<10.5su5
Cisco Unity Connection>=11.0<11.5.1su3
Cisco Unity Connection=9.5\(0.9\)tt0
Cisco Unity Connection=12.0
Cisco Virtualized Voice Browser>=11.6<11.6\(1\)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2017-6779?

    CVE-2017-6779 is a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition.

  • Which Cisco products are affected by CVE-2017-6779?

    Multiple Cisco products are affected by CVE-2017-6779, including Cisco Emergency Responder, Cisco Finesse, Cisco Hosted Collaboration Mediation Fulfillment, Cisco MediaSense, Cisco Prime Collaboration Assurance, Cisco Prime Collaboration Provisioning, Cisco Prime License Manager, Cisco SocialMiner, Cisco Unified Communications Manager, Cisco Unified Contact Center Express, Cisco Unified Intelligence Center, Cisco Unity Connection, and Cisco Virtualized Voice Browser.

  • What is the severity of CVE-2017-6779?

    CVE-2017-6779 has a severity rating of 7.5 (high).

  • How can an attacker exploit CVE-2017-6779?

    An attacker can exploit CVE-2017-6779 by sending specially crafted requests to the affected system, causing it to consume excessive disk space and resulting in a denial of service (DoS) condition.

  • Is there a fix for CVE-2017-6779?

    Yes, Cisco has released software updates to address the vulnerability. It is recommended to update to the latest available version of the affected products.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203