Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2015-07-16 |
Product | Videoscape Distribution Suite For Internet Streaming | Last view | 2016-02-29 |
Version | 3.3.0 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:videoscape_distribution_suite_for_internet_streaming |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2016-02-29 | CVE-2016-1353 | The TCP implementation in Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) 3.3(0), 3.3(1), 4.0(0), and 4.1(0) does not properly initiate new TCP sessions when a previous session is in a FIN wait state, which allows remote attackers to cause a denial of service (TCP outage) via vectors involving FIN packets, aka Bug ID CSCuy45136. |
7.8 | 2015-07-16 | CVE-2015-0725 | Cisco Videoscape Distribution Suite Service Broker (aka VDS-SB), when a VDSM configuration on UCS is used, and Videoscape Distribution Suite for Internet Streaming (aka VDS-IS or CDS-IS) before 3.3.1 R7 and 4.x before 4.0.0 R4 allow remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug IDs CSCus79834 and CSCuu63409. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-399 | Resource Management Errors |
50% (1) | CWE-20 | Improper Input Validation |