AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Multiple vulnerabilities exist in Cisco Unified MeetingPlace. This security advisory outlines the details of these vulnerabilities:
-
Insufficient validation of SQL commands
-
Unauthorized account creation
-
User and password enumeration in Cisco MeetingTime
-
Privilege escalation in Cisco MeetingTime
Workarounds are not available for these vulnerabilities.
This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20100127-mp.
-
Insufficient validation of SQL commands
-
Vulnerable Products
Cisco Unified MeetingPlace versions 5, 6, and 7 are each affected by at least one of the vulnerabilities described in this document.
The Cisco Unified MeetingPlace conferencing solution provides functionality that allows organizations to host integrated voice, video, and web conferencing. The solution is deployed on-network and integrated directly into an organization's private voice/data networks and enterprise applications. Cisco Unified MeetingPlace servers can be deployed so that the server is accessible from the Internet, allowing external parties to participate in meetings.
Cisco MeetingTime is a desktop application included with Cisco Unified MeetingPlace version 6.x that could be used to access and configure the Cisco Unified MeetingPlace Audio Server systems. MeetingTime classifies users as either end users, contacts, attendants, or system administrators.
The end-of-software maintenance for MeetingPlace version 5.3 occurred in April 2009. End-of-sale and end-of-life details are available at:
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
This Security Advisory describes multiple distinct vulnerabilities in the MeetingPlace and MeetingTime products. These vulnerabilities are independent of each other.
Insufficient Validation of SQL Commands
An unauthenticated user may be able to send SQL commands to manipulate the database that MeetingPlace uses to store information about server configuration, meetings, and users. These commands could be used to create, delete, or alter any of the information contained in the Cisco Unified MeetingPlace database.
This vulnerability is documented in Cisco Bug ID CSCtc39691 ( registered customers only) and has been assigned CVE ID CVE-2010-0139.
Unauthorized Account Creation
An unauthenticated user may be able to send a crafted URL to the internal interface of the Cisco Unified MeetingPlace web server to create a MeetingPlace user or administrator account.
This vulnerability is documented in Cisco Bug IDs CSCtc59231 ( registered customers only) and CSCtd40661 ( registered customers only) and has been assigned CVE ID CVE-2010-0140.
User and Password Enumeration in Cisco MeetingTime
The MeetingTime authentication sequence consists of a series of packets that are transmitted between the client and the Cisco Meeting Place Audio Server over TCP port 5001. An attacker may be able to alter the authentication sequence to access sensitive information in the user database including usernames and passwords.
This vulnerability is documented in Cisco Bug ID CSCsv76935 ( registered customers only) and has been assigned CVE ID CVE-2010-0141.
Privilege Escalation in Cisco MeetingTime
An attacker may be able to alter the packets in the MeetingTime authentication sequence to elevate the privileges of a normal user to an administrative user.
This vulnerability is documented in Cisco Bug ID CSCsv66530 ( registered customers only) and has been assigned CVE ID CVE-2010-0142.
-
There are no workarounds for the vulnerabilities described in this advisory.
-
The following table identifies the version of software in which each vulnerability was first fixed.
In order to obtain fixed software, administrators must install a hotfix over the latest maintenance release of MeetingPlace Web Conferencing solution.
The latest versions of Cisco MeetingPlace software can be downloaded from https://sec.cloudapps.cisco.com/support/downloads/go/Redirect.x?mdfid=278785523.
Information about how to obtain the hotfixes for software versions 6.0mr5 and 7.0mr1 can be found in the release notes enclosures of one of the following bugs: CSCtc39691 ( registered customers only) , CSCtc59231 ( registered customers only) , CSCtd40661 ( registered customers only) , CSCsv76935 ( registered customers only) , or CSCsv66530 ( registered customers only) .
Vulnerability
MeetingPlace 6
MeetingPlace 7
Insufficient validation of SQL commands
6.0.639.2
7.0(2.3) hotfix 5F
Unauthorized account creation
6.0.639.3
7.0(2.3) hotfix 5F
User and password enumeration in Cisco MeetingTime
MR5
Not applicable
Privilege escalation in MeetingTime
MR5
Not applicable
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
-
Cisco would like to thank the National Australia Bank's Security Assurance team and Credit Suisse for the discovery and reporting of these vulnerabilities.
The Cisco PSIRT is not aware of any malicious use of the vulnerabilities described in this advisory.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.1
2010-Feb-10
Added information on how to obtain hotfixes
Revision 1.0
2010-Jan-27
Initial public release
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.