Korean
<< Back
VID 29075
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS has multiple vulnerabilities in H.323 Message Processing.
The University of Oulu Secure Programming Group (OUSPG) has reported multiple vulnerabilities in the processing of H.323 messages and has created a test suite for H.323. H.323 is the International Telecommunications Union (ITU) standard for real-time multimedia communications and conferencing over packet-based (IP) networks. These vulnerabilities may be exploited to produce a denial of service (DoS) attack. When these vulnerabilities are exploited successfully, they may cause an affected device to crash or hang. Using this test suite, a remote attacker can generate programmatically test packets containing overly long or exceptional elements in various fields of the H.323 Protocol Data Units (PDUs), and then transmit it to an affected device. It can cause various parsing and processing functions to fail, which may result in a device crash and reload (or reboot) in most circumstances. A reboot of the device is required to return to regain normal functionality.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml

* Platforms Affected:
Cisco ATA 18x Any version
Cisco BTS 10200 Any version
Cisco CallManager 3.0 through 3.3
Cisco Conference Connection (CCC) Any version
Cisco Internet Service Node (ISN) Any version
Cisco IOS 11.3T
Cisco IOS 12.0,12.0S,12.0T,12.0XC,12.0XD,12.0XG-12.0XL,12.0XN,12.0XR,12.0XT
Cisco IOS 12.1,12.1AA,12.1E,12.1EC,12.1EZ,12.1T,12.1X-12.1XD,12.1XL,12.1XM
Cisco IOS 12.1XP-12.1XR,12.1XT-12.1XV,12.1YB-12.1YF,12.1YH,12.1YI,12.1YJ
Cisco IOS 12.2,12.2BX,12.2DD,12.2DX,12.2MC,12.2MX,12.2S,12.2X-12.2XN,12.2XQ
Cisco IOS 12.2XS-12.2XU,12.2XW, 12.2YB-12.2YZ, 12.2ZA-12.2ZH,12.2ZJ,12.2ZL
Cisco IP Phone 7905 1.00
All Cisco products that run Cisco IOS software and support H.323 packet processing
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (Vulnerabilities in H.323 Message Processing) at http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml .
Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com .

For details, see http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
Related URL CVE-2004-0054 (CVE)
Related URL 9406 (SecurityFocus)
Related URL 14204 (ISS)