AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Cisco Unity Connection contains two vulnerabilities:
- Cisco Unity Connection Privilege Escalation Vulnerability
- Cisco Unity Connection Denial of Service Vulnerability
Exploitation of the Cisco Unity Connection Privilege Escalation Vulnerability may allow an authenticated, remote attacker to elevate privileges and obtain full access to the affected system.
Exploitation of the Cisco Unity Connection Denial of Service Vulnerability may allow an unauthenticated, remote attacker to cause system services to terminate unexpectedly, which may result in a denial of service condition.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-cuc
-
Vulnerable Products
Cisco Unity Connection Privilege Escalation Vulnerability
The following versions of Cisco Unity Connection are vulnerable:
Version Affected Prior to 7.1 Yes 7.1 Yes 8.0 No 8.5 No 8.6 No
Note: Cisco Unity Connection versions prior to 7.1 reached end of software maintenance. Customers running versions prior to 7.1 should contact their Cisco support team for assistance in upgrading to a supported version of Cisco Unity Connection.
Cisco Unity Connection Denial of Service Vulnerability
The following versions of Cisco Unity Connection are vulnerable:
Version Affected Prior to 7.1 Yes 7.1 Yes 8.0 Yes 8.5 Yes
8.6 Yes
Note: Cisco Unity Connection versions prior to 7.1 reached end of software maintenance. Customers running versions prior to 7.1 should contact their Cisco support team for assistance in upgrading to a supported version of Cisco Unity Connection.Information About Cisco Business Edition
Cisco Business Edition, Cisco Business Edition 5000, and Cisco Business Edition 6000 are affected by these vulnerabilities if the Cisco Unity Connection version that is used is among the affected versions in the tables reported in the "Vulnerable Products" section of the security advisory.
Cisco Business Edition 3000 is not affected by the vulnerabilities included in this security advisory.
Determine the Software Version
To determine the Cisco Unity Connection software version that an appliance is running, administrators can access the Cisco Unity Connection web interface and click the "About" link at the top right.
Optionally administrators can log in to the command-line interface, and access the main menu. The software version can be identified by using the show version active command. The following example shows Cisco Unity Connection running version 8.6.2:
Welcome to the Platform Command Line Interface
admin:show version active
Active Master Version: 8.6.2.10000-30Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities. Cisco Unified Communication Manager and Cisco Business Edition 3000 are not vulnerable to these vulnerabilities.
-
Cisco Unity Connection is a feature-rich voice messaging platform that runs on the same Linux-based Cisco Unified Communications Operating System that is used by Cisco Unified Communications Manager. Cisco Unity Connection scales to support enterprise organizations with up to 100,000 users.
Cisco Unity Connection Privilege Escalation Vulnerability
Cisco Unity Connection contains a vulnerability that may allow an authenticated, remote attacker with privilege of the Help Desk Administrator role to elevate privileges and obtain full access to the affected system.
The vulnerability is due to improper privilege assignment and validation of the "Help Desk Administrator" role. An attacker could exploit this vulnerability by logging in to the system as the Help Desk Administrator user and changing the password for the administrative user.
This vulnerability is documented in Cisco bug ID CSCtd45141 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-0366.
Cisco Unity Connection Denial of Service Vulnerability
Cisco Unity Connection contains a vulnerability that may allow an unauthenticated, remote attacker to cause system services to terminate unexpectedly, which may result in a denial of service.
The vulnerability is due to improper handling of TCP segments. An attacker could exploit this vulnerability by sending a sequence of TCP segments to the affected system.
This vulnerability is documented in Cisco bug ID CSCtq67899 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-0367.
-
There are no workarounds that mitigate these vulnerabilities.
-
Cisco has released software updates that address these vulnerabilities.
Cisco Unity Connection Privilege Escalation Vulnerability - CSCtd45141
The following table contains the first fixed releases of software for Cisco Unity Connection, Cisco Business Edition, Cisco Business Edition 5000, and Cisco Business Edition 6000 that address the Cisco Unity Connection Privilege Escalation Vulnerability:
Version First Fix In 7.1 7.1.3b(Su2), 7.1.5 8.0 Not Affected
8.5 Not Affected 8.6 Not Affected Cisco Unity Connection Denial of Service Vulnerability - CSCtq67899
The following table contains the first fixed releases of software for Cisco Unity Connection, Cisco Business Edition, Cisco Business Edition 5000, and Cisco Business Edition 6000 that address the Cisco Unity Connection Denial of Service Vulnerability:
Version Remediation 7.1 7.1.5b(Su5) - Available April 6, 2012
8.0 Upgrade to 8.5.1(Su3) 8.5 8.5.1(Su3) 8.6 8.6.2 Remediation table
The following table contains the recommended releases, which include the fixes for all the vulnerabilities described in this advisory:
Version Remediation 7.1 7.1.5b(Su5) - Available April 6, 2012
8.0 Upgrade to 8.5.1(Su3) 8.5 8.5.1(Su3) 8.6 8.6.2 When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
The vulnerabilities described in this advisory were found during internal testing or discovered during the resolution of customer support cases.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.1 2012-April-02 Updated software release date. Revision 1.0 2012-February-29 Initial public release.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.