<div>This came out on the 14th:</div>
<div> </div>
<div>Scott</div>
<div> </div>
<div>****************************************************</div>
<div><span lang="EN">
<p>Message Type : Security Advisory</p>
<p>Title: Cisco Security Advisory: Cisco Unified Presence Denial of Service Vulnerabilities</p>
<p>URL:</p>
<p></p></span><a href="http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995682.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995682.shtml</span></font></font></u></a><font size="2"><span lang="EN">
<p>(available to registered users)</p>
<p></p></span></font><a href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/products/products_security_advisory09186a0080995682.shtml</span></font></font></u></a><font size="2"><span lang="EN">
<p>(available to non-registered users)</p>
<p>Posted: May 14, 2008</p>
<p>Summary: Cisco Unified Presence contains three denial of service (DoS) vulnerabilities that may cause an interruption in presence services. These vulnerabilities were discovered internally by Cisco, and there are no workarounds.</p>
<p>Cisco has released free software updates that address these vulnerabilities.</p>
<p>This email has been sent to <a href="mailto:scott.voll@wesd.org">scott.voll@wesd.org</a>.</p>
<p>You are receiving this notice because you subscribed to the Cisco Product Alert Tool (PAT) and created the following profile(s):</p>
<p>Cisco alerts</p>
<p>Subscribe/unsubscribe instructions :</p>
<p>If you choose not to receive these notices, or if you would like to make changes to your notification profile, please go to:</p>
<p></p></span></font><a href="http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en</span></font></font></u></a><font size="2"><span lang="EN">
<p> </p>
<p> and This:</p>
<p>**********************************************************************</p><span lang="EN">
<p>Message Type : Security Advisory</p>
<p>Title: Cisco Security Advisory: Cisco Unified Communications Manager Denial of Service Vulnerabilities</p>
<p>URL:</p>
<p></p></span><a href="http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995688.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995688.shtml</span></font></font></u></a></span></font><font size="2"><span lang="EN">
<p>(available to registered users)</p>
<p></p></span></font><a href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/products/products_security_advisory09186a0080995688.shtml</span></font></font></u></a><font size="2"><span lang="EN">
<p>(available to non-registered users)</p>
<p>Posted: May 14, 2008</p>
<p>Summary: Cisco Unified Communications Manager, formerly Cisco CallManager, contains multiple denial of service (DoS) vulnerabilities that may cause an interruption in voice services, if exploited. These vulnerabilities were discovered internally by Cisco. The following Cisco Unified Communications Manager services are affected:</p>
<p>Certificate Trust List (CTL) Provider</p>
<p>Certificate Authority Proxy Function (CAPF)</p>
<p>Session Initiation Protocol (SIP)</p>
<p>Simple Network Management Protocol (SNMP) Trap</p>
<p>Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.</p>
<p>This email has been sent to <a href="mailto:scott.voll@wesd.org">scott.voll@wesd.org</a>.</p>
<p>You are receiving this notice because you subscribed to the Cisco Product Alert Tool (PAT) and created the following profile(s):</p>
<p>Cisco alerts</p>
<p>Subscribe/unsubscribe instructions :</p>
<p>If you choose not to receive these notices, or if you would like to make changes to your notification profile, please go to:</p>
<p></p></span></font><a href="http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en</span></font></font></u></a><font size="2"><span lang="EN">
<p> and this:</p>
<p>*******************************************************************</p><span lang="EN">
<p>Message Type : Security Advisory</p>
<p>Title: Cisco Security Advisory: Cisco Content Switching Module Memory Leak Vulnerability</p>
<p>URL:</p>
<p></p></span><a href="http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995684.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/customer/products/products_security_advisory09186a0080995684.shtml</span></font></font></u></a></span></font><font size="2"><span lang="EN">
<p>(available to registered users)</p>
<p></p></span></font><a href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080995684.shtml"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://www.cisco.com/en/US/products/products_security_advisory09186a0080995684.shtml</span></font></font></u></a><font size="2"><span lang="EN">
<p>(available to non-registered users)</p>
<p>Posted: May 14, 2008</p>
<p>Summary: The Cisco Content Switching Module (CSM) and Cisco Content Switching Module with SSL (CSM-S) contain a memory leak vulnerability that can result in a denial of service condition. The vulnerability exists when the CSM or CSM-S is configured for layer 7 load balancing. An attacker can trigger this vulnerability when the CSM or CSM-S processes TCP segments with a specific combination of TCP flags while servers behind the CSM/CSM-S are overloaded and/or fail to accept a TCP connection.</p>
<p>Cisco has released free software updates that address this vulnerability.</p>
<p>This email has been sent to <a href="mailto:scott.voll@wesd.org">scott.voll@wesd.org</a>.</p>
<p>You are receiving this notice because you subscribed to the Cisco Product Alert Tool (PAT) and created the following profile(s):</p>
<p>Cisco alerts</p>
<p>Subscribe/unsubscribe instructions :</p>
<p>If you choose not to receive these notices, or if you would like to make changes to your notification profile, please go to:</p>
<p></p></span></font><a href="http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en"><u><font color="#0000ff" size="2"><font color="#0000ff" size="2"><span lang="EN">http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en</span></font></font></u></a><font size="2"><span lang="EN">
<p> </p>
<p> </p></span></font>
<p> </p><br><br></div>
<div class="gmail_quote">On Fri, May 30, 2008 at 5:06 AM, Miller, Steve <<a href="mailto:MillerS@dicksteinshapiro.com">MillerS@dicksteinshapiro.com</a>> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<div>
<div><span><font face="Arial" size="2">A colleague sent me this "heads up". Does anyone know about how real this risk is?</font></span></div>
<div><span><font face="Arial" size="2"></font></span> </div>
<div><span><font size="2"><font face="Arial">"<span><font size="2">This is from the CERTStation Newswire - not sure if it applies to what we have, passing along just in case.</font></span></font>
<div><span><font size="2"></font></span> </div>
<div><span>
<p><font face="Arial"><font size="3">Network appliance vendor Cisco has reported several vulnerabilities in its Unified Presence and Unified Communications Manager products. The bugs can be exploited for denial of service attacks. The Content Switching Module also contains such vulnerability. When the module is configured for layer 7 load balancing this allows TCP packets containing certain unspecified flags to trigger memory leaks. As a consequence, the system is paralyzed if the module is unable to make balancing decisions because the servers behind it are overloaded. The flaw has been fixed in software version <a href="http://4.2.9./" target="_blank">4.2.9.</a> Administrators can find suggestions about how to make their devices secure without software updates in Cisco's security advisories. In addition, Cisco has made software updates available for registered users. Administrators are advised to download and install the updates at their earliest convenience<span>".</span></font></font></p>
</span></div></font></span></div></div>
<p align="left"><strong>Steve Miller</strong><br>Telecom Engineer<br>Dickstein Shapiro LLP<br>1825 Eye Street NW | Washington, DC 20006<br>Tel (202) 420-3370| Fax (202) 330-5607<br><a href="mailto:MillerS@dicksteinshapiro.com" target="_blank">MillerS@dicksteinshapiro.com</a><font face="Arial"> </font></p>
<div> </div>
<p><pre>--------------------------------------------------------
This e-mail message and any attached files are confidential
and are intended solely for the use of the addressee(s)
named above. This communication may contain material
protected by attorney-client, work product, or other
privileges. If you are not the intended recipient or person
responsible for delivering this confidential communication
to the intended recipient, you have received this
communication in error, and any review, use, dissemination,
forwarding, printing, copying, or other distribution of
this e-mail message and any attached files is strictly
prohibited. Dickstein Shapiro reserves the right to monitor
any communication that is created, received, or sent on its
network. If you have received this confidential
communication in error, please notify the sender
immediately by reply e-mail message and permanently delete
the original message.
To reply to our email administrator directly, send an email
to <a href="mailto:postmaster@dicksteinshapiro.com" target="_blank">postmaster@dicksteinshapiro.com</a>
Dickstein Shapiro LLP
<a href="http://www.dicksteinshapiro.com/" target="_blank">http://www.DicksteinShapiro.com</a>
==============================================================================
</pre>
<p></p><br>_______________________________________________<br>cisco-voip mailing list<br><a href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</a><br><a href="https://puck.nether.net/mailman/listinfo/cisco-voip" target="_blank">https://puck.nether.net/mailman/listinfo/cisco-voip</a><br>
<br></p></blockquote></div><br>