Vulnerability Description
Heap-based buffer overflow in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM) 4.2 before 4.2(3)SR3 and 4.3 before 4.3(1)SR1, and CallManager 4.0 and 4.1 before 4.1(3)SR5c, allows remote attackers to cause a denial of service or execute arbitrary code via a long request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Unified Callmanager | 4.0 |
| Cisco | Unified Communications Manager | 4.2 |
Related Weaknesses (CWE)
References
- http://dvlabs.tippingpoint.com/advisory/TPTI-08-02
- http://secunia.com/advisories/28530
- http://securityreason.com/securityalert/3551
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080932c61.sPatch
- http://www.securityfocus.com/archive/1/486432/100/0/threaded
- http://www.securityfocus.com/bid/27313
- http://www.securitytracker.com/id?1019223
- http://www.vupen.com/english/advisories/2008/0171
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39704
- http://dvlabs.tippingpoint.com/advisory/TPTI-08-02
- http://secunia.com/advisories/28530
- http://securityreason.com/securityalert/3551
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080932c61.sPatch
- http://www.securityfocus.com/archive/1/486432/100/0/threaded
- http://www.securityfocus.com/bid/27313
FAQ
What is CVE-2008-0027?
CVE-2008-0027 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in the Certificate Trust List (CTL) Provider service (CTLProvider.exe) in Cisco Unified Communications Manager (CUCM) 4.2 before 4.2(3)SR3 and 4.3 before 4.3(1)SR1, and Call...
How severe is CVE-2008-0027?
CVE-2008-0027 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0027?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Unified Callmanager, Cisco Unified Communications Manager.