CVE-2009-2052
Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), 7.0 before 7.0(2), and 7.1 before 7.1(2); and Cisco Unified Presence 1.x, 6.x before 6.0(6), and 7.x before 7.0(4); allows remote attackers to cause a denial of service (TCP services outage) via a large number of TCP connections, related to "tracking of network connections," aka Bug IDs CSCsq22534 and CSCsw52371.
Published
2009-08-27T17:00:01.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
6.9
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
References
-
http://secunia.com/advisories/36498
Vendor Advisory
([email protected])
-
http://secunia.com/advisories/36499
Vendor Advisory
([email protected])
-
http://secunia.com/advisories/37039
Third Party Advisory
([email protected])
-
http://securitytracker.com/id?1023018
Third Party Advisory, VDB Entry
([email protected])
-
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml
Patch, Vendor Advisory
([email protected])
-
http://www.cisco.com/en/US/products/products_security_advisory09186a0080afc930.shtml
Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/36152
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/36676
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1022775
Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2009/2915
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/36498
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/36499
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/37039
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1023018
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.cisco.com/en/US/products/products_security_advisory09186a0080afc930.shtml
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/36152
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/36676
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1022775
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2009/2915
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)