A vulnerability in the Session Initiation Protocol (SIP) protocol implementation of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of input SIP traffic. An attacker could exploit this vulnerability by sending a malformed SIP packet to an affected Cisco Unified Communications Manager. A successful exploit could allow the attacker to trigger a new registration process on all connected phones, temporarily disrupting service.
                
            References
                    | Link | Resource | 
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucm-dos | Patch Vendor Advisory | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucm-dos | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 04:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-cucm-dosĀ - Patch, Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 8.6 | 
Information
                Published : 2019-07-06 02:15
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1887
Mitre link : CVE-2019-1887
CVE.ORG link : CVE-2019-1887
JSON object : View
Products Affected
                cisco
- unified_communications_manager
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
