[<prev] [next>] [day] [month] [year] [list]
Message-id: <201302271136010.cisco-sa-20130227-hcs@psirt.cisco.com>
Date: Wed, 27 Feb 2013 11:36:18 -0500
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: full-disclosure@...ts.grok.org.uk
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco Prime Central for
Hosted Collaboration Solution Assurance Excessive CPU
Utilization Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco Security Advisory: Cisco Prime Central for Hosted Collaboration
Solution Assurance Excessive CPU Utilization Vulnerability
Advisory ID: cisco-sa-20130227-hcs
Revision 1.0
For Public Release 2013 February 27 16:00 UTC (GMT)
+----------------------------------------------------------------------
Summary
=======
Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance
contains a vulnerability that could allow an unauthenticated, remote
attacker to cause a denial of service (DoS) condition. Exploitation of
this vulnerability could interrupt the monitoring of voice services.
Cisco has released free software updates that address this
vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130227-hcs
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iF4EAREIAAYFAlEuKpwACgkQUddfH3/BbTpUMgD/TLGii8+uTgOp8UBzeEmZsJ6Q
sLT9c+XAR4TtJz5bA1QA/0TpTDrf6Rq0KqnvaCORkSDZhhuSHLRMt49MNdOhvHHN
=POis
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists