Operating System:

[Cisco]

Published:

16 February 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0445
         Cisco Meeting Server API Denial of Service Vulnerability
                             16 February 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Meeting Server
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3837 CVE-2017-3830 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170215-cms1

Comment: This bulletin contains two (2) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Security Advisory

Cisco Meeting Server API Denial of Service Vulnerability

Medium
Advisory ID:
cisco-sa-20170215-cms
First Published:
2017 February 15 16:00  GMT
Version 1.0:
Final
Workarounds:
Yes
Cisco Bug IDs:
CSCvc89678
CVE-2017-3830
CWE-20
CVSS Score:
Base 6.5, Temporal 6.5
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:X/RL:X/RC:X
CVE-2017-3830
CWE-20
Download CVRF
Download PDF
Email

Summary

A vulnerability in an internal API of the Cisco Meeting Server (CMS) could
allow an unauthenticated, remote attacker to cause a denial of service
(DoS) condition on the affected appliance.

The vulnerability is due to invalid data being received on a specific port.
An attacker could exploit this vulnerability by sending crafted packets to
a specific port on the device. Successful exploitation could cause the CMS
to crash.

There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20170215-cms

Affected Products

Vulnerable Products

This vulnerability affects Cisco Meeting Server. For information about
affected software releases, consult the Cisco bug ID(s) at the top of this
advisory.

Products Confirmed Not Vulnerable

No other Cisco products are currently known to be affected by this
vulnerability.

Workarounds

There are workarounds that address this vulnerability. The firewall
functionality of the CMS can be leveraged to block external access to port
2829.

Fixed Software

For information about fixed software releases, consult the Cisco bug ID(s)
at the top of this advisory.

When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories and Alerts page, to determine exposure and a
complete upgrade solution.

In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.

Exploitation and Public Announcements

The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.

Cisco Security Vulnerability Policy

To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.

URL

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20170215-cms

Revision History



Version         Description         Section  Status        Date        

1.0      Initial public release.            Final   2017-February-15  

Show Less



Legal Disclaimer

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the
distribution URL is an uncontrolled copy and may lack important information
or contain factual errors. The information in this document is intended for
end users of Cisco products.

Cisco Security Vulnerability Policy

To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.

===================================================================
Cisco Security Advisory

Cisco Meeting Server HTTP Packet Processing Vulnerability

Medium
Advisory ID:
cisco-sa-20170215-cms1
First Published:
2017 February 15 16:00  GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvc89551
CVE-2017-3837
CWE-20
CVSS Score:
Base 5.4, Temporal 5.4
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L/E:X/RL:X/RC:X
CVE-2017-3837
CWE-20
Download CVRF
Download PDF
Email

Summary

A vulnerability in the Web Bridge interface of the Cisco Meeting Server
(CMS), formerly Acano Conferencing Server, could allow an authenticated,
remote attacker to retrieve memory contents, which could lead to the
disclosure of confidential information. In addition, the attacker could
potentially cause the application to crash unexpectedly, resulting in a
denial of service (DoS) condition. The attacker would need to be
authenticated and have a valid session with the Web Bridge.

The vulnerability is due to insufficient input validation of an HTTP
request. An attacker could exploit this vulnerability by sending a crafted
HTTP packet to a targeted application. A successful exploit could allow the
attacker to retrieve memory contents, which could lead to the disclosure of
confidential information or cause a DoS condition.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20170215-cms1

Affected Products

Vulnerable Products

This vulnerability affects Cisco Meeting Server software releases prior to
2.1.2. This product was previously known as Acano Conferencing Server.

Products Confirmed Not Vulnerable

No other Cisco products are currently known to be affected by this
vulnerability.

Details

Cisco Meeting Server incorporates video, audio, and content-sharing
capabilities into software that can be accessed via a conference room,
desktop, or mobile device. The Cisco Meeting Server product works across
Cisco video rooms and connects with Skype for Business and other hardware
providers to allow a seamless meeting architecture. This capability exists
via collaboration between Cisco and Acano, who joined Cisco in early 2016.
Software releases prior to 2.0 are available via Acano's website at https:/
/www.acano.com/support/downloads.

Workarounds

There are no workarounds that address this vulnerability.

Fixed Software

For information about fixed software releases, consult the Cisco bug ID(s)
at the top of this advisory.

When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories and Alerts page, to determine exposure and a
complete upgrade solution.

In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.

Exploitation and Public Announcements

The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.

Source

Cisco would like to thank Hugo Boutinon of Gotham Digital Science for
finding and reporting this vulnerability.

Cisco Security Vulnerability Policy

To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.

URL

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
cisco-sa-20170215-cms1

Revision History


Version         Description         Section  Status        Date        

1.0      Initial public release.            Final   2017-February-15  

Show Less



Legal Disclaimer

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the
distribution URL is an uncontrolled copy and may lack important information
or contain factual errors. The information in this document is intended for
end users of Cisco products.

Cisco Security Vulnerability Policy

To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=j7gN
-----END PGP SIGNATURE-----