Cisco Unity Connection Bulk Administration Tool Connection Request resource management

A vulnerability was found in Cisco Unity Connection (Unified Communication Software) (the affected version unknown). It has been classified as problematic. This affects an unknown code block of the component Bulk Administration Tool. Upgrading eliminates this vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

147
014

Field

vulnerability_discoverydate1
vulnerability_cvss3_nvd_basescore1
exploit_0day_days1
vulnerability_cvss3_vuldb_rc1
vulnerability_cvss3_vuldb_rl1

Commit Conf

100%53
90%8

Approve Conf

100%53
90%8
IDCommitedUserFieldChangeRemarksAcceptedReasonC
835150903/30/2020VulD...discoverydate153852480003/30/2020accepted
100
835156410/06/2018VulD...cvss3_nvd_basescore6.8nist.gov10/06/2018accepted
90
835156310/06/2018VulD...0day_days210/06/2018accepted
90
835156210/06/2018VulD...cvss3_vuldb_rcCsee CVSS documentation10/06/2018accepted
90
835156110/06/2018VulD...cvss3_vuldb_rlOsee CVSS documentation10/06/2018accepted
90
835156010/06/2018VulD...cvss3_vuldb_eXsee CVSS documentation10/06/2018accepted
90
835155910/06/2018VulD...cvss2_vuldb_rcCsee CVSS documentation10/06/2018accepted
90
835155810/06/2018VulD...cvss2_vuldb_rlOFsee CVSS documentation10/06/2018accepted
90
835155710/06/2018VulD...cvss2_vuldb_eNDsee CVSS documentation10/06/2018accepted
90
835155610/06/2018VulD...cve_nvd_summaryA vulnerability in the Bulk Administration Tool (BAT) for Cisco Unity Connection could allow an authenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software does not restrict the maximum size of certain files that can be written to disk. An attacker who has valid administrator credentials for an affected system could exploit this vulnerability by sending a crafted, remote connection request to an affected system. A successful exploit could allow the attacker to write a file that consumes most of the available disk space on the system, causing application functions to operate abnormally and leading to a DoS condition.cve.org10/06/2018accepted
100
835155510/06/2018VulD...cve_nvd_published1538697600cve.org10/06/2018accepted
100
835155410/06/2018VulD...cve_assigned1534456800 (08/17/2018)cve.org10/06/2018accepted
100
835155310/06/2018VulD...cveCVE-2018-15396cve.org10/06/2018accepted
100
835155210/06/2018VulD...nameUpgrade10/06/2018accepted
100
835155110/06/2018VulD...price_0day$0-$5ksee exploit price documentation10/06/2018accepted
100
835155010/06/2018VulD...identifiercisco-sa-20181003-unity-dos10/06/2018accepted
100
835154910/06/2018VulD...urlhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-unity-dostools.cisco.com10/06/2018accepted
100
835154810/06/2018VulD...typeAdvisory10/06/2018accepted
100
835154710/06/2018VulD...locationWebsite10/06/2018accepted
100
835154610/06/2018VulD...date1538690400 (10/05/2018)10/06/2018accepted
100

41 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!