{"vuid":"VU#495275","idnumber":"495275","name":"Cisco CallManager contains memory leak","keywords":["Cisco CallManager","memory leak","failure to authenticate","Call Telephony Integration","CTI","WebAttendent","Active Directory","RIS Data Collector","LDAP"],"overview":"The Cisco Call Manager contains a vulnerability that could permit an intruder to crash the Call Manager.","clean_desc":"The Cisco Call Manageris software to manage telephone calls in a mixed data and voice environment. Specifically the Cisco Call Manager  \"extends enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-IP (VoIP) gateways, and multimedia applications.1\" The software contains a vulnerability that allows could permit an intruder to consume memory until the system crashes. Quoting from   Cisco's Security Advisory: The Cisco CallManager, running certain software releases, has a vulnerability wherein a memory leak in the CTI Framework authentication can cause the server to crash and result in a reload. This vulnerability can be exploited to initiate a denial of service (DoS) attack. It may be possible for the vulnerability to be triggered accidentally. For more information, see the vendor statement from Cisco below.","impact":"An intruder could interrupt the normal function of the Cisco Call Manager, causing it to crash and reload.","resolution":"Upgrade to a more recent version of Cisco Call Manager, as described in  http://www.cisco.com/warp/public/707/callmanager-ctifw-leak-pub.shtml.","workarounds":"","sysaffected":"","thanks":"Thanks to Cisco Systems Product Security Incident Response Team for reporting this vulnerability.","author":"This document was written by Shawn V Hernan, based on information provided by Cisco Systems.","public":["http://www.cisco.com/warp/public/707/callmanager-ctifw-leak-pub.shtml","http://www.cisco.com/warp/public/cc/pd/nemnsw/callmn/index.shtml","http://www.cisco.com/warp/public/180/prod_plat/cust_cont/icm/cti.html","http://www.securityfocus.com/bid/4370"],"cveids":["CVE-2002-0505"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-03-27T17:30:23Z","publicdate":"2002-03-27T00:00:00Z","datefirstpublished":"2002-08-10T04:14:26Z","dateupdated":"2002-08-10T04:24:03Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.625","cam_scorecurrentwidelyknown":"5.625","cam_scorecurrentwidelyknownexploited":"10.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.625,"vulnote":null}