Feeds

Cisco goes public with major vulns

Unified comms, hosted collaboration need fixes

Top 5 reasons to deploy VMware with Tegile

Users of Cisco's Unified Communications Manager, UCM instant messaging and presence, and Prime Central hosted collaboration system need to get busy with patches, after the Borg announced denial-of-service vulnerabilities across all three platforms.

UCM 7.1, Cisco advises, has an improper error handling vulnerability that can be used in denial-of-service. An attacker can hose the system by sending malformed registration messages.

There are also vulns in versions 8.5, 8.6 and 9.0 of UCM: some UDP ports don't rate-limit properly, and could therefore be hit with high-rate traffic for denial-of-service. The same versions also fail to rate-limit on UDP 5060, the SIP port.

There's also a buffer overrun vulnerability on UCM 7.1, 8.5, 8.6, 9.0 and 9.1. If exploited, an attacker would be able to run arbitrary commands, corrupt data, and disrupt services on the systems.

UCM's IM and Presence Service suffers from a memory leak, meaning large numbers of TCP connections to port 5060 or 5061 could DoS the system, requiring a restart.

And finally, Cisco Prime Central for HCS Assurance – a hosted application solution – has three vulnerabilities, all of them exposing the system to denial-of-service attacks. They are, in order:

  • A memory leak under which TCP flooding on vulnerable ports will crash the system;
  • Memory exhaustion vulnerabilities associated with TCP 61615 and 61616, and the Ephemeral Java Port (44444); and
  • A disk exhaustion vulnerability under which a TCP connection flood will fill the disk with error logs.

With no workarounds available, Cisco is advising patches be applied to all affected systems. ®

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.