#VU1139 Remote code execution in Cisco Meeting Server


Published: 2016-11-02 | Updated: 2018-04-05

Vulnerability identifier: #VU1139

Vulnerability risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-6448

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Meeting Server
Client/Desktop applications / Multimedia software

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system
The weakness is due to improper input validation. By sending a specially crafted Session Description Protocol (SDP) packets, a remote attacker can cayse a buffer overflow in the processing of media lines in the SDP parser and execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution.

Mitigation
Update to version 2.0.3.

Vulnerable software versions

Cisco Meeting Server: 1.8 - 2.0.3


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-cms1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability