The call-handling implementation in Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, 9.x prior to 9.1(2)SU2, and 10.0 prior to 10.0(1)SU1, when SIP trunk integration is enabled, allows remote malicious users to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco unity connection 8.6\\(2\\) |
||
cisco unity connection 8.5_base |
||
cisco unity connection 8.6_base |
||
cisco unity connection 9.0\\(1\\) |
||
cisco unity connection 8.5\\(1\\)su4 |
||
cisco unity connection 8.5\\(1\\)su5 |
||
cisco unity connection 8.5\\(1\\)su6 |
||
cisco unity connection 10.0.5 |
||
cisco unity connection 8.6\\(2a\\) |
||
cisco unity connection 8.6\\(2a\\)su1 |
||
cisco unity connection 8.6\\(2a\\)su2 |
||
cisco unity connection 9.1\\(2\\) |
||
cisco unity connection 8.6\\(1a\\) |
||
cisco unity connection 8.6\\(2a\\)su3 |
||
cisco unity connection 8.5\\(1\\)su1 |
||
cisco unity connection 8.5\\(1\\)su3 |
||
cisco unity connection 10.0.0 |
||
cisco unity connection 9.1\\(1\\) |
||
cisco unity connection 8.6\\(1\\) |
||
cisco unity connection 8.5\\(1\\) |
||
cisco unity connection 8.5\\(1\\)su2 |