Last Modified: Oct. 18, 2016
Polycom MGC 25 allows remote attackers to cause a denial of service (crash) via a large number of "user" requests to the control port 5003, as demonstrated using the blast TCP stress tester.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial
Base Score: 5.0
Exploitability Score: 10.0
Impact Score: 2.9
CVSS V2: AV:N/AC:L/Au:N/C:N/I:N/A:P
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:h:polycom:mgc-50:*:*:*:*:*:*:*:* Part: h Vendor: polycom | Alle Schwachstellen für polycom | |
cpe:2.3:h:polycom:mgc-25:5.51.21:*:*:*:*:*:*:* Part: h Vendor: polycom | Alle Schwachstellen für polycom | |
cpe:2.3:h:polycom:mgc-25:5.51.211:*:*:*:*:*:*:* Part: h Vendor: polycom | Alle Schwachstellen für polycom | |
cpe:2.3:h:polycom:mgc-100:*:*:*:*:*:*:*:* Part: h Vendor: polycom | Alle Schwachstellen für polycom |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="device" value="cpe:2.3:h:polycom:mgc-50:*:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-25:5.51.21:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-25:5.51.211:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-100:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="device" value="cpe:2.3:h:polycom:mgc-50:*:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-25:5.51.21:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-25:5.51.211:*:*:*:*:*:*:*"/> <prop key="device" value="cpe:2.3:h:polycom:mgc-100:*:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="existence"/> </set> <prop key="range" value="remote"/> </set>