{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T10:44:46.928","vulnerabilities":[{"cve":{"id":"CVE-2017-6779","sourceIdentifier":"psirt@cisco.com","published":"2018-06-07T12:29:00.260","lastModified":"2025-07-31T15:03:24.870","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable. This vulnerability affects the following Cisco Voice Operating System (VOS)-based products: Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IM&P - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection, Virtualized Voice Browser. This vulnerability also affects Prime Collaboration Assurance and Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818, CSCvi31823."},{"lang":"es","value":"Múltiples productos Cisco se han visto afectados por una vulnerabilidad en la gestión de archivos locales para ciertos archivos de log del sistema de productos Cisco Collaboration que podrían permitir que un atacante remoto no autenticado provoque un gran uso del disco, lo que resulta en una condición de denegación de servicio (DoS). La vulnerabilidad ocurre debido a que cierto archivo de registro del sistema no tiene una restricción de tamaño máximo. Por lo tanto, se permite que el archivo consuma la mayoría de espacio disponible en el dispositivo. Un atacante podría explotar esta vulnerabilidad enviando peticiones de conexión remota manipuladas al dispositivo. La explotación con éxito podría permitir que el atacante aumente el tamaño de un archivo de log del sistema para que consuma casi todo el espacio del disco. La falta de espacio disponible en el disco podría desembocar en una condición de denegación de servicio (DoS) en la que las funciones de la aplicación podrían operar de forma errónea, haciendo que la aplicación sea inestable. Esta vulnerabilidad afecta a los siguientes productos basados en Cisco Voice Operating System (VOS): Emergency Responder, Finesse, Hosted Collaboration Mediation Fulfillment, MediaSense, Prime License Manager, SocialMiner, Unified Communications Manager (UCM), Unified Communications Manager IM and Presence Service (IMP - earlier releases were known as Cisco Unified Presence), Unified Communication Manager Session Management Edition (SME), Unified Contact Center Express (UCCx), Unified Intelligence Center (UIC), Unity Connection y Virtualized Voice Browser. Esta vulnerabilidad también afecta a Prime Collaboration Assurance y Prime Collaboration Provisioning. Cisco Bug IDs: CSCvd10872, CSCvf64322, CSCvf64332, CSCvi29538, CSCvi29543, CSCvi29544, CSCvi29546, CSCvi29556, CSCvi29571, CSCvi31738, CSCvi31741, CSCvi31762, CSCvi31807, CSCvi31818 y CSCvi31823."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5","versionEndExcluding":"10.5\\(1a\\)","matchCriteriaId":"57F71C50-5AEA-4C57-B40D-BD175CE99F61"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.5\\(4\\)","matchCriteriaId":"EADE21CC-8C70-4270-9431-30C4213A8115"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.0su1","matchCriteriaId":"650A41E1-9A81-4C08-9DDF-9CDDC6E22202"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:emergency_responder:11.0\\(1.10000.10\\):*:*:*:*:*:*:*","matchCriteriaId":"6E73AED2-74FE-410F-835A-7BD9E5E6C7DE"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5","versionEndExcluding":"11.5\\(3\\)","matchCriteriaId":"17A01F3E-24B2-4FE4-8466-6DE2EFA0530C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:finesse:9.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"359B9780-D7A7-467C-A665-573C62E981EB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_mediation_fulfillment:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5","versionEndExcluding":"11.5\\(3\\)","matchCriteriaId":"B834DBFE-9CB9-486C-8084-3735D0994D7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_mediation_fulfillment:9.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"2D3EAC03-CB4A-423D-95BF-D7AB258CE2E0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:mediasense:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5","versionEndExcluding":"11.5su2","matchCriteriaId":"8CEF5671-AEB6-442B-8D9F-242447410512"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:mediasense:9.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"37B3DC93-6772-4836-B969-3D8B0359D4AF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_collaboration_assurance:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6_es16","matchCriteriaId":"CB04C20D-B989-4B4D-B5F9-C2067CC886E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_collaboration_assurance:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1","versionEndExcluding":"12.1_es2","matchCriteriaId":"B92B3174-0187-4C3A-AFE7-2443FBAEA97E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_collaboration_provisioning:12.5:*:*:*:*:*:*:*","matchCriteriaId":"2BDA7BD5-70AE-431C-8E92-171A84BAA77F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_license_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5","versionEndExcluding":"10.5.2","matchCriteriaId":"FA9960C4-874D-44DF-B686-9039179378F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_license_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.5\\(1\\)su5","matchCriteriaId":"10FC0ED2-B2D2-4F52-B2B0-AC0DDCB430E9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:socialminer:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6.1","matchCriteriaId":"F8F4EDF5-67A4-42E1-BCB3-DB36A74C15A7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0","versionEndExcluding":"10.5\\(2\\)su5","matchCriteriaId":"DE65718F-D5E7-4FFA-985E-D0BCE395DBAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.0\\(1a\\)su4","matchCriteriaId":"CE99092A-3EB2-4F0B-8812-ECA6B67AA301"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5","versionEndExcluding":"11.5\\(1\\)su3","matchCriteriaId":"8439C2DF-9F4B-40FE-8898-6331064026AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*","matchCriteriaId":"520555C7-5E9B-4C76-AAB5-5DD8B29D18F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*","matchCriteriaId":"F47282B9-8B76-40E0-B72C-A6A196A37A0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*","matchCriteriaId":"21BFC3A9-B6B1-49EE-A93A-6432BFE33E84"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_communications_manager:12.0:*:*:*:*:*:*:*","matchCriteriaId":"05BD68E4-4296-49ED-B789-60B935210C28"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6\\(1\\)","matchCriteriaId":"271E4847-9AF4-4DDC-82AB-3BE20F7A67F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_contact_center_express:9.0\\(2\\)su1.3:*:*:*:*:*:*:*","matchCriteriaId":"31FFF48A-B174-4FD6-9626-E81B5BAE3B43"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6\\(1\\)","matchCriteriaId":"30B24C3F-B602-42B6-95E8-C1E4B247A28D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_intelligence_center:9.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"1D8337AC-7B8F-42E0-A714-ACD569C0CA77"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5","versionEndExcluding":"10.5su5","matchCriteriaId":"4F1EF97D-52BC-4A60-9A73-09BFAAD05DAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.5.1su3","matchCriteriaId":"DFD34725-568D-4612-A84F-FF524D57F0E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_connection:9.5\\(0.9\\)tt0:*:*:*:*:*:*:*","matchCriteriaId":"0C5B4499-83A3-461B-AC8C-45BEABCBA1CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unity_connection:12.0:*:*:*:*:*:*:*","matchCriteriaId":"65D225AB-813B-4182-8916-0FE8307BB18B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6","versionEndExcluding":"11.6\\(1\\)","matchCriteriaId":"A9928C83-6BEB-44AA-BB2E-AA2B9DC58BE4"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-diskdos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-diskdos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}