Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
Link | Tags |
---|---|
http://secunia.com/advisories/23978 | third party advisory vendor advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml | patch vendor advisory |
http://securitytracker.com/id?1017575 | vdb entry |
http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml | vendor advisory |
http://www.securityfocus.com/bid/22330 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31990 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138 | vdb entry signature |
http://www.vupen.com/english/advisories/2007/0428 | vdb entry |
http://www.kb.cert.org/vuls/id/438176 | us government resource third party advisory patch |