CVE-2015-0613 (CNNVD-201504-063)
中文标题:
Cisco Unity Connection Conversation Manager 拒绝服务漏洞
英文标题:
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1...
漏洞描述
中文描述:
Cisco Unity Connection(UC)是美国思科(Cisco)公司的一套语音留言平台。该平台可利用语音命令,以“免提”方式拨打电话或者收听留言。 Cisco Unity Connection的Connection Conversation Manager进程中存在安全漏洞。当程序启用SIP trunk集成时,远程攻击者可通过发送特制的SIP INVITE消息利用该漏洞造成拒绝服务(重启)。以下版本受到影响:Cisco Unity Connection 8.5(1)SU7之前8.5版本,8.6(2a)SU4之前8.6版本,9.1(2)SU2之前9.x版本,10.0(1)SU1之前10.0版本。
英文描述:
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul20444.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | unity_connection | 8.5\(1\) | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su1 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su1:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su2 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su2:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su3 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su3:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su4 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su4:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su5 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su5:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5\(1\)su6 | - | - |
cpe:2.3:a:cisco:unity_connection:8.5\(1\)su6:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.5_base | - | - |
cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(1\) | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(1\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(1a\) | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(1a\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(2\) | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(2\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(2a\) | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(2a\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(2a\)su1 | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(2a\)su1:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(2a\)su2 | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(2a\)su2:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6\(2a\)su3 | - | - |
cpe:2.3:a:cisco:unity_connection:8.6\(2a\)su3:*:*:*:*:*:*:*
|
| cisco | unity_connection | 8.6_base | - | - |
cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*
|
| cisco | unity_connection | 9.0\(1\) | - | - |
cpe:2.3:a:cisco:unity_connection:9.0\(1\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 9.1\(1\) | - | - |
cpe:2.3:a:cisco:unity_connection:9.1\(1\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 9.1\(2\) | - | - |
cpe:2.3:a:cisco:unity_connection:9.1\(2\):*:*:*:*:*:*:*
|
| cisco | unity_connection | 10.0.0 | - | - |
cpe:2.3:a:cisco:unity_connection:10.0.0:*:*:*:*:*:*:*
|
| cisco | unity_connection | 10.0.5 | - | - |
cpe:2.3:a:cisco:unity_connection:10.0.5:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:M/Au:N/C:N/I:N/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2015-0613 |
2025-11-11 15:18:53 | 2025-11-11 07:33:58 |
| NVD | nvd_CVE-2015-0613 |
2025-11-11 14:54:49 | 2025-11-11 07:42:41 |
| CNNVD | cnnvd_CNNVD-201504-063 |
2025-11-11 15:09:33 | 2025-11-11 07:51:56 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201504-063
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.1
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 21
- data_sources: ['cve'] -> ['cve', 'nvd']