Vulnerability Name: CVE-2004-0056 (CCN-14173) Assigned: 2004-01-13 Published: 2004-01-13 Updated: 2008-09-05 Summary: Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2003-0819 Source: MITRE Type: CNACVE-2004-0054 Source: MITRE Type: CNACVE-2004-0056 Source: MITRE Type: CNACVE-2004-0097 Source: MITRE Type: CNACVE-2004-0498 Source: MITRE Type: CNACVE-2004-2629 Source: MITRE Type: CNACVE-2004-2758 Source: CCN Type: RHSA-2004-047pwlib security update Source: CCN Type: RHSA-2004-048Updated PWLib packages fix protocol security issues Source: CCN Type: SA10611Microsoft ISA Server 2000 H.323 Protocol Filter Vulnerability Source: CCN Type: SA10665SunForum H.323 Protocol Implementation Vulnerabilities Source: CCN Type: SA11192First Virtual Communications Products H.323 Implementation Vulnerabilities Source: CCN Type: SECTRACK ID: 1008685Cisco IOS Routers Can Be Crashed With Malformed H.323 Packets Source: CCN Type: SECTRACK ID: 1008687Nortel Business Communications Manager H.323 Flaws Let Remote Users Deny Service Source: CCN Type: SECTRACK ID: 1008698Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code Source: CCN Type: SECTRACK ID: 1008749SunForum H.323 Processing Bug May Let Remote Users Execute Arbitrary Code Source: CCN Type: Sun Alert ID: 57476SunForum is Vulnerable to Issues Described in CERT Advisory CA-2004-01 Multiple H.323 Message Source: CCN Type: Sun Alert ID: 101429 (formerly 57476)Security Vulnerability in SunForum Involving the H.323 Protocol Source: CCN Type: CERT Advisory CA-2004-01Multiple H.323 Message Vulnerabilities Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2004-01 Source: CCN Type: CIAC Information Bulletin O-050Cisco Vulnerabilities in H.323 Message Processing Source: CCN Type: Cisco Systems Inc. Security Advisory, 2004 January 13 UTC 1200Vulnerabilities in H.323 Message Processing Source: DEBIAN Type: DSA-448pwlib -- several vulnerabilities Source: CCN Type: University of Oulu Web sitePROTOS Test-Suite: c07-h2250v4 Source: CCN Type: GLSA-200404-11Multiple Vulnerabilities in pwlib Source: CCN Type: US-CERT VU#749342Multiple vulnerabilities in H.323 implementations Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#749342 Source: BID Type: UNKNOWN9406 Source: CCN Type: BID-9406Multiple Vendor H.323 Protocol Implementation Vulnerabilities Source: CCN Type: BID-9408Microsoft ISA Server 2000 H.323 Filter Remote Buffer Overflow Vulnerability Source: SECTRACK Type: UNKNOWN1008687 Source: CCN Type: NISCC Vulnerability Advisory 006489/H323Vulnerability Issues in Implementations of the H.323 Protocol Source: CCN Type: NISCC Vulnerability Advisory 060525/H323An Update to the Vulnerability Issues in Implementations of the H.323 Protocol Source: MISC Type: UNKNOWNhttp://www.uniras.gov.uk/vuls/2004/006489/h323.htm Source: CCN Type: Internet Security Systems Security Alert, January 13, 2004Multiple Vendor H.323 Implementation Vulnerabilities Source: XF Type: UNKNOWNC07h2250v4-attacktool-malformed-packets(14173) Vulnerable Configuration: Configuration 1 :cpe:/a:nortel:business_communications_manager:*:*:*:*:*:*:*:* OR cpe:/h:nortel:802.11_wireless_ip_gateway:*:*:*:*:*:*:*:* OR cpe:/h:nortel:succession_communication_server_1000:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1t:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1e:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1ez:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2x:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0s:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0t:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2t:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2:*:*:*:*:*:*:* OR cpe:/h:cisco:ata-186:*:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/a:checkpoint:next_generation:*:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1ec:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2s:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:11.3t:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1aa:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1yj:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xl:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xm:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1yh:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1yi:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2bx:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2dd:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2dx:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2mc:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2mx:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2zj:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2zl:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2xq:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2xw:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:cisco:conference_connection:-:*:*:*:*:*:*:* OR cpe:/h:cisco:internet_service_node:*:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xc:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xd:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xn:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xq:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xr:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xt:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xw:*:*:*:*:*:*:* OR cpe:/a:nortel:business_communications_manager:*:*:*:*:*:*:*:* OR cpe:/a:sun:sunforum:3d_1.0:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2za:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xg:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2yb:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.2xs:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1yb:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.0xg:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xp:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xt:*:*:*:*:*:*:* OR cpe:/o:cisco:ios:12.1xc:*:*:*:*:*:*:* OR cpe:/a:cisco:unified_callmanager:3.3:*:*:*:*:*:*:* OR cpe:/a:sun:sunforum:-:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:* Denotes that component is vulnerable BACK
nortel business communications manager *
nortel 802.11 wireless ip gateway *
nortel succession communication server 1000 *
hp hp-ux 11.00
cisco ios 12.0
cisco ios 12.1t
cisco ios 12.1e
cisco ios 12.1ez
cisco ios 12.2x
cisco ios 12.0s
cisco ios 12.0t
cisco ios 12.1
cisco ios 12.2t
cisco ios 12.2
cisco ata-186 *
debian debian linux 3.0
checkpoint next generation *
cisco ios 12.1ec
cisco ios 12.2s
cisco ios 11.3t
cisco ios 12.1aa
cisco ios 12.1yj
cisco ios 12.1xl
cisco ios 12.1xm
cisco ios 12.1yh
cisco ios 12.1yi
cisco ios 12.2bx
cisco ios 12.2dd
cisco ios 12.2dx
cisco ios 12.2mc
cisco ios 12.2mx
cisco ios 12.2zj
cisco ios 12.2zl
cisco ios 12.2xq
cisco ios 12.2xw
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
cisco conference connection -
cisco internet service node *
cisco ios 12.0xc
cisco ios 12.0xd
cisco ios 12.0xn
cisco ios 12.0xq
cisco ios 12.0xr
cisco ios 12.0xt
cisco ios 12.1xw
nortel business communications manager *
sun sunforum 3d_1.0
cisco ios 12.2za
cisco ios 12.1xg
cisco ios 12.2yb
cisco ios 12.2xs
cisco ios 12.1yb
cisco ios 12.0xg
cisco ios 12.1xp
cisco ios 12.1xt
cisco ios 12.1xc
cisco unified callmanager 3.3
sun sunforum -
gentoo linux *
mandrakesoft mandrake linux 9.1
redhat linux 9.0
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux 9.2