<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>CISCO Unified Personal Communicator 7.0 (1.13056) Remote Denial of Service Vulnerability</description>
		<keywords>fuzzing, exploit, DoS, Remote DoS, eyeBeamAsDLLk9.dll, CUPCK9.exe, CVE-2010-3048</keywords>
	</meta>

	<title>CISCO Unified Personal Communicator 7.0 (1.13056) Remote Denial of Service Vulnerability</title>
	<id>FMA-2010-002</id>

	<refs>
		<ref>
			<name>CVE</name>
			<id>CVE-2010-3048</id>
		</ref>
		<ref>
			<name>Cisco</name>
			<id>CSCti67933</id>
		</ref>
	</refs>

	<application>
		<name>Cisco Unified Personal Communicator</name>
		<version>7.0</version>
		<url>http://www.cisco.com</url>
		<files>
			<file>
				<name>CUPCK9.exe</name>
				<version>7.0</version>
				<md5>59b74dc39280aaa51431527cc56ba83b</md5>
			</file>
			<file>
				<name>eyeBeamAsDLLk9.dll</name>
				<version></version>
				<md5>8d579b4769faa189cac733b91dc47c9f </md5>
			</file>
		</files>
		<verified>
			<os>
				<name>Windows Server 2003</name>
			</os>
		</verified>
	</application>
	
	<discovery>
		<found>2010.03.15</found>
		<vendor_notified>2010.07.29</vendor_notified>
		<published>2011.01.11</published>
	</discovery>

	<vulnerabilities>
		<vulnerability>
			<name>Remote Denial of Service Vulnerability</name>
			<type>DoS</type>
			<description>Cisco Unified Personal Communicator is a powerful communication platform for business, name CUPC later used for simplicity. Fuzzing CUPC, revealed that application is not freeing allocated memory for received data and is not performing any validation if memory allocation was successful. The mentioned finding allowed us to prepare proof of concept exploit that using this issue, causes remote Denial of Service of CUPC. Authentication is not required to exploit this vulnerability. Denial of Service is caused by not handled access violation exception thrown in DLL module eyeBeamAsDLLk9. Application after allocating buffer for packet data is not validating if memory allocation was successful. If memory allocation fails we have null pointer dereference. Memory allocation will fail when process used all available user mode memory which can be used by heap manager.</description>
			<exception>Access violation exception thrown in DLL module eyeBeamAsDLLk9 after dereferencing null pointer.</exception>
			<images>
				<image>
					<thumbnail>
						<src>image01s.png</src>
						<width>67</width>
						<height>100</height>
					</thumbnail>
					<src>image01.png</src>
					<alt>Cisco Unified Personal Communicator version</alt>
					<text>Cisco Unified Personal Communicator version</text>
				</image>
				<image>
					<thumbnail>
						<src>image02s.png</src>
						<width>171</width>
						<height>100</height>
					</thumbnail>
					<src>image02.png</src>
					<alt>Access violation exception thrown in DLL module eyeBeamAsDLLk9 after dereferencing null pointer.</alt>
					<text>Access violation exception thrown in DLL module eyeBeamAsDLLk9 after dereferencing null pointer.</text>
				</image>
			</images>
		</vulnerability>	
	</vulnerabilities>
	
</advisory>