VID |
29139 |
Severity |
40 |
Port |
161 |
Protocol |
UDP |
Class |
CISCO |
Detailed Description |
The Cisco IOS, according to its version number, has a denial of service vulnerability Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device when SIP operation is enabled. Remote code execution may also be possible. Cisco has released free software updates that address these vulnerabilities. For devices that must run SIP there are no workarounds however, mitigations are available to limit exposure of the vulnerabilities.
* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, ""snmp/guessable/r"" from the Policy Editor. And also, if SGBP is disabled, please ignore this alert.
* References: http://www.cisco.com/warp/public/707/cisco-sa-20100324-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20100324-bundle.shtml http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml
* Platforms Affected: Cisco IOS versions 12.3 through 12.4 |
Recommendation |
Upgrade to the fixed Cisco IOS version, as listed in "Software Versions and Fixes" of Cisco Security Advisory (IOS Software Session Initiation Protocol Denial of Service) at http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.co |
Related URL |
CVE-2010-0579 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|