CVE-2018-0280 (CNNVD-201805-628)

HIGH
中文标题:
Cisco Meeting Server 输入验证漏洞
英文标题:
A vulnerability in the Real-Time Transport Protocol (RTP) bitstream processing of the Cisco Meeting ...
CVSS分数: 7.5
发布时间: 2018-05-17 03:00:00
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Meeting Server(前称Acano Conferencing Server,CMS)是美国思科(Cisco)公司的一套包含音频、视频的会议服务器软件。 Cisco Meeting Server中的Real-Time Transport Protocol(RTP)位流的处理存在输入验证漏洞,该漏洞源于程序没有充分对进入的RTP位流执行输入验证。远程攻击者可通过向Meeting Server发送特制的RTP位流利用该漏洞造成拒绝服务。以下版本受到影响:Cisco Meeting Server 2.0版本,2.1版本,2.2版本,2.3版本。

英文描述:

A vulnerability in the Real-Time Transport Protocol (RTP) bitstream processing of the Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of incoming RTP bitstreams. An attacker could exploit this vulnerability by sending a crafted RTP bitstream to an affected Cisco Meeting Server. A successful exploit could allow the attacker to deny audio and video services by causing media process crashes resulting in a DoS condition on the affected product. This vulnerability affects Cisco Meeting Server deployments that are running Cisco Meeting Server Software Releases 2.0, 2.1, 2.2, and 2.3. Cisco Bug IDs: CSCve79693, CSCvf91393, CSCvg64656, CSCvh30725, CSCvi86363.

CWE类型:
CWE-20
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco meeting_server 2.0 - - cpe:2.3:a:cisco:meeting_server:2.0:*:*:*:*:*:*:*
cisco meeting_server 2.1 - - cpe:2.3:a:cisco:meeting_server:2.1:*:*:*:*:*:*:*
cisco meeting_server 2.2 - - cpe:2.3:a:cisco:meeting_server:2.2:*:*:*:*:*:*:*
cisco meeting_server 2.2.5 - - cpe:2.3:a:cisco:meeting_server:2.2.5:*:*:*:*:*:*:*
cisco meeting_server 2.2.8 - - cpe:2.3:a:cisco:meeting_server:2.2.8:*:*:*:*:*:*:*
cisco meeting_server 2.3 - - cpe:2.3:a:cisco:meeting_server:2.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
104209 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
1040923 vdb-entry
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.0
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2018-05-17 03:00:00
修改时间:
2024-11-29 15:09:26
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:45
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0280 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0280 2025-11-11 14:55:54 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201805-628 2025-11-11 15:10:01 2025-11-11 07:53:45
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:45
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-201805-628; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-201805-628
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 6
  • data_sources: ['cve'] -> ['cve', 'nvd']