Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D9CEBA2-160F-4303-9C1D-C7BD7E758CFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A704B14E-EC47-47E5-8AA1-35E0138B6A69", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F95246B-7822-4077-BC9C-3E1C0B02C139", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A5D01D8A-9F92-4900-941C-0B481D277D95", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "E72DE400-8ACA-4D01-8BBE-7F13959F4DDC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F049CAA8-6FA8-4642-910C-70C8D3CEAF96", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1706BFD4-817A-4BA2-8B3B-60CDF1F54A16", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B9C5872-317C-4A68-8E99-DEB224BAE607", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "D6F4FC53-3627-4826-8CFC-BEEBCB8CEC87", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BACEF63-F22A-4B39-84AE-A950AC024EB0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "703C2FA6-B723-41B1-BEA3-87AABD6F85DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "80D0D477-4976-45FB-A089-5C19119D2BC6", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "0398D739-6A84-4817-AFD0-80A4513F1AD4", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(2.1101\\):*:*:*:*:*:*:*", "matchCriteriaId": "33A4FA6A-D37D-465D-921A-51E429A30537", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(3.1101-2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDE292F1-2F4F-40BE-9E2A-E3F1C55857EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(4.1101-5\\):*:*:*:*:*:*:*", "matchCriteriaId": "B709CF6E-C148-4AD6-962B-A1055396DC8D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5.1101-1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B64ACB1-C4E5-48B9-8747-4F7AFA6955A2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0\\(5.1103-2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3AB3FB41-7A7B-4342-9ED2-27ACDD29E5D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:6.0.5.1102-1:*:*:*:*:*:*:*", "matchCriteriaId": "A81DC553-FFAB-4D13-8484-E174CA918D23", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.3.10102-3:*:*:*:*:*:*:*", "matchCriteriaId": "ED42650B-EDED-4CC5-BA26-D179E7F25177", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.3.10103-2:*:*:*:*:*:*:*", "matchCriteriaId": "B734482D-2E7E-4A4B-BB3C-3ABC2EB8FD50", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_presence_server:7.0.4.10101-2:*:*:*:*:*:*:*", "matchCriteriaId": "EE3D3770-3C99-4FCF-9B42-727A40D6062F", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SIPD in Cisco Unified Presence 6.x before 6.0(7) and 7.x before 7.0(8) allows remote attackers to cause a denial of service (stack memory corruption and process failure) via a malformed SIP message, aka Bug ID CSCtd14474."}, {"lang": "es", "value": "SIPD de Cisco Unified Presence v6.x anterior a v6.0(7) y v7.x anterior a v7.0(8) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la pila de memoria y fallo del proceso) mediante un mensaje SIP mal formado. Tambi\u00e9n se conoce como Bug ID CSCtd14474."}], "id": "CVE-2010-2839", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-08-26T21:00:01.530", "references": [{"source": "psirt@cisco.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"}, {"source": "psirt@cisco.com", "url": "http://www.vupen.com/english/advisories/2010/2186"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2186"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}