#VU41288 Buffer overflow in Nextcloud iOS App


Published: 2014-09-25 | Updated: 2020-08-10

Vulnerability identifier: #VU41288

Vulnerability risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-3361

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Nextcloud iOS App
Other software / Other software solutions

Vendor: Nextcloud

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The ALG module in Cisco IOS 15.0 through 15.4 does not properly implement SIP over NAT, which allows remote attackers to cause a denial of service (device reload) via multipart SDP IPv4 traffic, aka Bug ID CSCun54071.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Nextcloud iOS App: 15.0 - 15.4


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat/cvrf/cisco-sa-20140924-nat_cvrf.xml
http://www.securityfocus.com/bid/70129
http://www.securitytracker.com/id/1030896
http://exchange.xforce.ibmcloud.com/vulnerabilities/96181


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability