Korean
<< Back
VID 29139
Severity 40
Port 161
Protocol UDP
Class CISCO
Detailed Description The Cisco IOS, according to its version number, has a denial of service vulnerability Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device when SIP operation is enabled. Remote code execution may also be possible.
Cisco has released free software updates that address these vulnerabilities. For devices that must run SIP there are no workarounds however, mitigations are available to limit exposure of the vulnerabilities.

* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, ""snmp/guessable/r"" from the Policy Editor. And also, if SGBP is disabled, please ignore this alert.

* References:
http://www.cisco.com/warp/public/707/cisco-sa-20100324-sip.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20100324-bundle.shtml
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml

* Platforms Affected:
Cisco IOS versions 12.3 through 12.4
Recommendation Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (IOS Software Session Initiation Protocol Denial of Service) at http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml

Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.co
Related URL CVE-2010-0579 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)