Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "101FCDD0-DC91-4111-975E-DE618D3B4E9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "D386D8CD-D6EA-4705-ABDC-EA6558F5AC30", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B1917B-197C-4E28-9356-2ACC4C4DB932", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su3:*:*:*:*:*:*:*", "matchCriteriaId": "5567A000-338E-40D7-9481-674B8FFC142D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su4:*:*:*:*:*:*:*", "matchCriteriaId": "AA991A88-D49E-4957-B404-6E3C15C96994", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su5:*:*:*:*:*:*:*", "matchCriteriaId": "BECA1F06-6FFD-4A0D-B140-B25E39FB8513", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su6:*:*:*:*:*:*:*", "matchCriteriaId": "2ADCE50E-87C1-49D7-B127-92174327EAB4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*", "matchCriteriaId": "8D11810A-80D7-41BB-B370-30218FF52F17", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C547C041-6C58-44D5-93D7-C02E04E93994", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C40F61A6-A992-4DA4-9730-D145055596C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "78970987-BD6E-48A0-AF43-540C925E1F97", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "632B8CDD-5ACC-4FFB-950B-480CC43D192D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "7740A5EF-538E-4095-91F5-E4DC03EDB35B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "D805DD4A-269D-4399-B6BF-7F40F98C3BE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su3:*:*:*:*:*:*:*", "matchCriteriaId": "A06A53BA-668B-41C0-B223-6637487EF113", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*", "matchCriteriaId": "82B3ABB4-A33A-4886-9871-C24B33B3AEE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:9.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6793E1F6-DC57-4A13-B49D-0ED45E48426C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:9.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "50CD06E4-0C09-4DD7-B106-56DC680CE333", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unity_connection:9.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BA2751A8-A3CF-4CC7-A7F2-003165C1AEDB", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819."}, {"lang": "es", "value": "El proceso Connection Conversation Manager (tambi\u00e9n conocido como CuCsMgr) en Cisco Unity Connection 8.5 anterior a 8.5(1)SU7, 8.6 anterior a 8.6(2a)SU4, y 9.x anterior a 9.1(2)SU2, cuando la integraci\u00f3n de SIP 'trunk' est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (volcado de n\u00facleo y reinicio) mediante la terminaci\u00f3n incorrecta de las conexiones TCP del protocolo de inicio de sesi\u00f3n (SIP), tambi\u00e9n conocido como Bug ID CSCul69819."}], "id": "CVE-2015-0616", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-04-03T18:59:04.757", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1032010"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032010"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-19"}], "source": "nvd@nist.gov", "type": "Primary"}]}