Improper input validation in Cisco Unity Connection - CVE-2018-15396

 

Improper input validation in Cisco Unity Connection - CVE-2018-15396

Published: October 3, 2018 / Updated: October 9, 2018


Vulnerability identifier: #VU15218
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-15396
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Unity Connection

Detailed vulnerability description

The vulnerability allows a remote high-privileged attacker to cause DoS condition on the target system.

The vulnerability exists due to improper restriction of the maximum size of certain files that can be written to disk. A remote attacker who has valid administrator credentials for an affected system can send a specially crafted, remote connection request, write a file that consumes most of the available disk space on the system and cause application functions to operate abnormally and lead to a DoS condition. 


How to mitigate CVE-2018-15396

The vulnerability has been fixed in the version 12.5(0.97000.301), 12.0(1.22900.7), 12.5(0.202), 12.0(1.53).

Sources