CVE编号
CVE-2012-0366利用情况
暂无补丁情况
N/A披露时间
2012-03-01漏洞描述
Cisco Unity Connection是一个由语音、视频、数据和移动产品及应用组成的全面IP通信系统。Cisco Unity Connection包含一个安全漏洞,允许已验证远程攻击者把HelpDesk管理角色提升为管理员用户,完全控制系统。漏洞是由于对"Help Desk Administrator"角色未能正确的权限分配和校验引起的,攻击者可以以Help Desk管理用户登录,并更改管理员用户密码。解决建议
Cisco Unity Connection 7.1.5和7.1.3b(Su2)已经修复此漏洞,建议用户下载使用:http://www.cisco.com/en/US/products/ps6509/index.html
参考链接 |
|
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | * |
Up to (including) 7.1\(3b\)su1 |
|||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.1(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.1(1)_es1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.1(1)_es12 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.1(1)_sr1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.2(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.2(1)sr2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 1.2(1)_es65 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.0(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(2) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(3) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(3b)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(4) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(4)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(4a) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(4a)su2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(5) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(5)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(5)su2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 2.1(5)su3 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 6.1(3b)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.0(2) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.0(2a)su2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.0(2a)su3 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(2) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(2a) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(2a)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(2b) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(2b)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(3) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(3a) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(3a)su1 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(3a)su1a | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(3b) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5)su1a | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5a) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5b) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5b)su2 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5b)su3 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 7.1(5b)su4 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 一次
- 影响范围 N/A
- 用户交互 无
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...