CNVD-2017-33721
Vulnerability from cnvd - Published: 2017-11-13
VLAI Severity ?
Title
Cisco Meeting Server Traversal Using Relay NAT服务器未授权访问漏洞
Description
Cisco Meeting Server(前称Acano Conferencing Server,CMS)是美国思科(Cisco)公司的一套包含音频、视频的会议服务器软件。Traversal Using Relay NAT(TURN) server是其中的一个多媒体应用的遍历服务器。
CMS 2.0.16之前的版本、2.1.11之前的版本和2.2.6之前的版本中的TURN服务器存在安全漏洞,该漏洞源于TURN服务器未能正确的默认配置。远程攻击者可通过未授权将TURN服务器连接到Call Bridge利用该漏洞获取未授权的Call Bridge、数据库集群或敏感会议信息的访问权限。
Severity
高
Patch Name
Cisco Meeting Server Traversal Using Relay NAT服务器未授权访问漏洞的补丁
Patch Description
Cisco Meeting Server(前称Acano Conferencing Server,CMS)是美国思科(Cisco)公司的一套包含音频、视频的会议服务器软件。Traversal Using Relay NAT(TURN) server是其中的一个多媒体应用的遍历服务器。
CMS 2.0.16之前的版本、2.1.11之前的版本和2.2.6之前的版本中的TURN服务器存在安全漏洞,该漏洞源于TURN服务器未能正确的默认配置。远程攻击者可通过未授权将TURN服务器连接到Call Bridge利用该漏洞获取未授权的Call Bridge、数据库集群或敏感会议信息的访问权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170913-cmsturn
Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-12249
http://www.securityfocus.com/bid/100821
Impacted products
| Name | ['Cisco Meeting Server 2.1', 'Cisco Meeting Server 2.0.3', 'Cisco Meeting Server 2.0.2', 'Cisco Meeting Server 2.0.1', 'Cisco Meeting Server 2.1.4', 'Cisco Meeting Server 2.1.2', 'Cisco Meeting Server 2.0.15', 'Cisco Meeting Server 2.18', 'Cisco Meeting Server 2.2.1', 'Cisco Meeting Server 2.2.2', 'Cisco Meeting Server 2.2.3', 'Cisco Meeting Server 2.2.4', 'Cisco Meeting Server 2.2.5'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "100821"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-12249"
}
},
"description": "Cisco Meeting Server\uff08\u524d\u79f0Acano Conferencing Server\uff0cCMS\uff09\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u5305\u542b\u97f3\u9891\u3001\u89c6\u9891\u7684\u4f1a\u8bae\u670d\u52a1\u5668\u8f6f\u4ef6\u3002Traversal Using Relay NAT(TURN) server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u591a\u5a92\u4f53\u5e94\u7528\u7684\u904d\u5386\u670d\u52a1\u5668\u3002\r\n\r\nCMS 2.0.16\u4e4b\u524d\u7684\u7248\u672c\u30012.1.11\u4e4b\u524d\u7684\u7248\u672c\u548c2.2.6\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684TURN\u670d\u52a1\u5668\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eTURN\u670d\u52a1\u5668\u672a\u80fd\u6b63\u786e\u7684\u9ed8\u8ba4\u914d\u7f6e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u672a\u6388\u6743\u5c06TURN\u670d\u52a1\u5668\u8fde\u63a5\u5230Call Bridge\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u672a\u6388\u6743\u7684Call Bridge\u3001\u6570\u636e\u5e93\u96c6\u7fa4\u6216\u654f\u611f\u4f1a\u8bae\u4fe1\u606f\u7684\u8bbf\u95ee\u6743\u9650\u3002",
"discovererName": "Cisco",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170913-cmsturn",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-33721",
"openTime": "2017-11-13",
"patchDescription": "Cisco Meeting Server\uff08\u524d\u79f0Acano Conferencing Server\uff0cCMS\uff09\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u5305\u542b\u97f3\u9891\u3001\u89c6\u9891\u7684\u4f1a\u8bae\u670d\u52a1\u5668\u8f6f\u4ef6\u3002Traversal Using Relay NAT(TURN) server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u591a\u5a92\u4f53\u5e94\u7528\u7684\u904d\u5386\u670d\u52a1\u5668\u3002\r\n\r\nCMS 2.0.16\u4e4b\u524d\u7684\u7248\u672c\u30012.1.11\u4e4b\u524d\u7684\u7248\u672c\u548c2.2.6\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684TURN\u670d\u52a1\u5668\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eTURN\u670d\u52a1\u5668\u672a\u80fd\u6b63\u786e\u7684\u9ed8\u8ba4\u914d\u7f6e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u672a\u6388\u6743\u5c06TURN\u670d\u52a1\u5668\u8fde\u63a5\u5230Call Bridge\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u672a\u6388\u6743\u7684Call Bridge\u3001\u6570\u636e\u5e93\u96c6\u7fa4\u6216\u654f\u611f\u4f1a\u8bae\u4fe1\u606f\u7684\u8bbf\u95ee\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco Meeting Server Traversal Using Relay NAT\u670d\u52a1\u5668\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco Meeting Server 2.1",
"Cisco Meeting Server 2.0.3",
"Cisco Meeting Server 2.0.2",
"Cisco Meeting Server 2.0.1",
"Cisco Meeting Server 2.1.4",
"Cisco Meeting Server 2.1.2",
"Cisco Meeting Server 2.0.15",
"Cisco Meeting Server 2.18",
"Cisco Meeting Server 2.2.1",
"Cisco Meeting Server 2.2.2",
"Cisco Meeting Server 2.2.3",
"Cisco Meeting Server 2.2.4",
"Cisco Meeting Server 2.2.5"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-12249\r\nhttp://www.securityfocus.com/bid/100821",
"serverity": "\u9ad8",
"submitTime": "2017-09-14",
"title": "Cisco Meeting Server Traversal Using Relay NAT\u670d\u52a1\u5668\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…