Show plain JSON{"id": "CVE-2008-0528", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-02-15T02:00:00.000", "references": [{"url": "http://secunia.com/advisories/28935", "tags": ["Vendor Advisory"], "source": "psirt@cisco.com"}, {"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml", "tags": ["Patch"], "source": "psirt@cisco.com"}, {"url": "http://www.securityfocus.com/bid/27774", "source": "psirt@cisco.com"}, {"url": "http://www.securitytracker.com/id?1019409", "source": "psirt@cisco.com"}, {"url": "http://www.vupen.com/english/advisories/2008/0543", "source": "psirt@cisco.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40492", "source": "psirt@cisco.com"}, {"url": "http://secunia.com/advisories/28935", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/27774", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1019409", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2008/0543", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40492", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SIP firmware might allow remote attackers to execute arbitrary code via a SIP message with crafted MIME data."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en los tel\u00e9fonos Cisco Unified IP Phone 7940, 7940G, 7960 y 7960G ejecut\u00e1ndose en un software empotrado (firmware) SIP, puede que permita a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un mensaje SIP con los datos MIME manipulados."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7906g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "53A9A468-CAC3-4DC6-B839-557DBE8246D3"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7911g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26830222-1503-4748-A104-334265D8F06F"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7935:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19712324-A41D-49F1-AA74-3B30A731FF47"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7936:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43F9E1FE-4BD5-40B9-B239-B2185821A551"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7941g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFE61DF2-3D61-400F-BA70-B506412C9C28"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7961g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F0B76F56-31D4-4576-AC95-00AED498F25A"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7970g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2747DB12-83B9-40E4-9671-382E241C98EE"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7971g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF0EBD01-E3AC-44C7-A03A-EDDBA18794C5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:skinny_client_control_protocol_\\(sccp\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FDB3D25-274E-42F5-B5C1-B2A7875F94EE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26BC4C08-16FD-4E27-AC7E-155E9CBAB808"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7940g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "987BEE5F-5686-4B83-A6EF-903C86439BB3"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EE292B7-DFC7-402C-BC10-9293D32B75B3"}, {"criteria": "cpe:2.3:h:cisco:unified_ip_phone:7960g:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "648AFF80-3F8B-4966-9899-530F498C8B3B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:session_initiation_protocol_\\(sip\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "780CE3C9-7CA3-4770-8DC9-BCB3365C32F9"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@cisco.com", "evaluatorSolution": "Patch requires login"}