Lucene search

K
ciscoCiscoCISCO-SA-20110928-SIP
HistorySep 28, 2011 - 4:00 p.m.

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerabilities

2011-09-2816:00:00
tools.cisco.com
22

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.014

Percentile

86.2%

Multiple vulnerabilities exist in the Session Initiation Protocol (SIP)
implementation in Cisco IOS Software and Cisco IOS XE Software that could allow
an unauthenticated, remote attacker to cause a reload of an affected device or
trigger memory leaks that may result in system instabilities. Affected devices
would need to be configured to process SIP messages for these vulnerabilities
to be exploitable.

Cisco has released software updates that address these vulnerabilities. There are no workarounds for devices that must run SIP;
however, mitigations are available to limit exposure to the
vulnerabilities.

This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-sip[“[[Publication_URL]]”].

Note: The September 28, 2011, Cisco IOS Software
Security Advisory bundled publication includes ten Cisco Security Advisories.
Nine of the advisories address vulnerabilities in Cisco IOS Software, and one
advisory addresses a vulnerability in Cisco Unified Communications Manager.
Each advisory lists the Cisco IOS Software releases that correct the
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco
IOS Software releases that correct all vulnerabilities in the September 2011
Bundled Publication.

Individual publication links are in “Cisco Event Response:
Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the
following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep11.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep11.html”]

Cisco Unified Communications Manager is affected by one of the
vulnerabilities described in this advisory. A separate Cisco Security Advisory
has been published to disclose the vulnerability that affects the Cisco Unified
Communications Manager at the following location:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm”]

[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-cucm”]

Affected configurations

Vulners
Node
ciscoiosMatch12.4mr
OR
ciscoiosMatch12.4t
OR
ciscoiosMatch12.4xc
OR
ciscoiosMatch12.4xe
OR
ciscoiosMatch12.4xj
OR
ciscoiosMatch12.4xv
OR
ciscoiosMatch12.4xw
OR
ciscoiosMatch12.4xy
OR
ciscoiosMatch12.4xz
OR
ciscoiosMatch12.4xl
OR
ciscoiosMatch12.4xm
OR
ciscoiosMatch15.0m
OR
ciscoiosMatch15.0xa
OR
ciscoiosMatch15.1t
OR
ciscoiosMatch15.1xb
OR
ciscoiosMatch15.0s
OR
ciscoiosMatch12.4mrb
OR
ciscoiosMatch15.1s
OR
ciscoiosMatch15.1m
OR
ciscoiosMatch15.1gc
OR
ciscoiosMatch12.4ys
OR
ciscoiosMatch12.4\(11\)mr
OR
ciscoiosMatch12.4\(9\)mr
OR
ciscoiosMatch12.4\(12\)mr
OR
ciscoiosMatch12.4\(16\)mr
OR
ciscoiosMatch12.4\(16\)mr1
OR
ciscoiosMatch12.4\(19\)mr2
OR
ciscoiosMatch12.4\(19\)mr1
OR
ciscoiosMatch12.4\(19\)mr
OR
ciscoiosMatch12.4\(20\)mr
OR
ciscoiosMatch12.4\(19\)mr3
OR
ciscoiosMatch12.4\(12\)mr1
OR
ciscoiosMatch12.4\(20\)mr2
OR
ciscoiosMatch12.4\(16\)mr2
OR
ciscoiosMatch12.4\(12\)mr2
OR
ciscoiosMatch12.4\(20\)mr1
OR
ciscoiosMatch12.4\(9\)t
OR
ciscoiosMatch12.4\(11\)t
OR
ciscoiosMatch12.4\(15\)t
OR
ciscoiosMatch12.4\(20\)t
OR
ciscoiosMatch12.4\(24\)t
OR
ciscoiosMatch12.4\(24\)t3
OR
ciscoiosMatch12.4\(20\)t1
OR
ciscoiosMatch12.4\(22\)t1
OR
ciscoiosMatch12.4\(15\)t9
OR
ciscoiosMatch12.4\(11\)t4
OR
ciscoiosMatch12.4\(15\)t8
OR
ciscoiosMatch12.4\(15\)t15
OR
ciscoiosMatch12.4\(24\)t5
OR
ciscoiosMatch12.4\(15\)t2
OR
ciscoiosMatch12.4\(15\)t12
OR
ciscoiosMatch12.4\(24\)t4
OR
ciscoiosMatch12.4\(9\)t5
OR
ciscoiosMatch12.4\(20\)t3
OR
ciscoiosMatch12.4\(22\)t
OR
ciscoiosMatch12.4\(15\)t6a
OR
ciscoiosMatch12.4\(20\)t6
OR
ciscoiosMatch12.4\(9\)t3
OR
ciscoiosMatch12.4\(15\)t13
OR
ciscoiosMatch12.4\(15\)t3
OR
ciscoiosMatch12.4\(24\)t2
OR
ciscoiosMatch12.4\(22\)t5
OR
ciscoiosMatch12.4\(15\)t10
OR
ciscoiosMatch12.4\(22\)t4
OR
ciscoiosMatch12.4\(20\)t5
OR
ciscoiosMatch12.4\(9\)t6
OR
ciscoiosMatch12.4\(15\)t4
OR
ciscoiosMatch12.4\(24\)t1
OR
ciscoiosMatch12.4\(9\)t4
OR
ciscoiosMatch12.4\(22\)t3
OR
ciscoiosMatch12.4\(20\)t9
OR
ciscoiosMatch12.4\(9\)t1
OR
ciscoiosMatch12.4\(15\)t13b
OR
ciscoiosMatch12.4\(20\)t5a
OR
ciscoiosMatch12.4\(15\)t5
OR
ciscoiosMatch12.4\(20\)t2
OR
ciscoiosMatch12.4\(11\)t1
OR
ciscoiosMatch12.4\(15\)t11
OR
ciscoiosMatch12.4\(9\)t0a
OR
ciscoiosMatch12.4\(15\)t7
OR
ciscoiosMatch12.4\(11\)t2
OR
ciscoiosMatch12.4\(9\)t7
OR
ciscoiosMatch12.4\(15\)t14
OR
ciscoiosMatch12.4\(11\)t3
OR
ciscoiosMatch12.4\(15\)t6
OR
ciscoiosMatch12.4\(15\)t1
OR
ciscoiosMatch12.4\(9\)t2
OR
ciscoiosMatch12.4\(22\)t2
OR
ciscoiosMatch12.4\(20\)t4
OR
ciscoiosMatch12.4\(4\)xc
OR
ciscoiosMatch12.4\(4\)xc1
OR
ciscoiosMatch12.4\(4\)xc5
OR
ciscoiosMatch12.4\(4\)xc7
OR
ciscoiosMatch12.4\(4\)xc3
OR
ciscoiosMatch12.4\(4\)xc4
OR
ciscoiosMatch12.4\(4\)xc2
OR
ciscoiosMatch12.4\(4\)xc6
OR
ciscoiosMatch12.4\(6\)xe
OR
ciscoiosMatch12.4\(6\)xe2
OR
ciscoiosMatch12.4\(6\)xe1
OR
ciscoiosMatch12.4\(11\)xj
OR
ciscoiosMatch12.4\(11\)xj1
OR
ciscoiosMatch12.4\(11\)xj3
OR
ciscoiosMatch12.4\(11\)xj6
OR
ciscoiosMatch12.4\(11\)xj2
OR
ciscoiosMatch12.4\(11\)xj5
OR
ciscoiosMatch12.4\(11\)xj4
OR
ciscoiosMatch12.4\(11\)xv
OR
ciscoiosMatch12.4\(11\)xv1
OR
ciscoiosMatch12.4\(11\)xw
OR
ciscoiosMatch12.4\(11\)xw3
OR
ciscoiosMatch12.4\(11\)xw7
OR
ciscoiosMatch12.4\(11\)xw10
OR
ciscoiosMatch12.4\(11\)xw8
OR
ciscoiosMatch12.4\(11\)xw9
OR
ciscoiosMatch12.4\(11\)xw6
OR
ciscoiosMatch12.4\(11\)xw4
OR
ciscoiosMatch12.4\(11\)xw1
OR
ciscoiosMatch12.4\(11\)xw5
OR
ciscoiosMatch12.4\(11\)xw2
OR
ciscoiosMatch12.4\(15\)xy4
OR
ciscoiosMatch12.4\(15\)xy5
OR
ciscoiosMatch12.4\(15\)xy1
OR
ciscoiosMatch12.4\(15\)xy
OR
ciscoiosMatch12.4\(15\)xy2
OR
ciscoiosMatch12.4\(15\)xy3
OR
ciscoiosMatch12.4\(15\)xz
OR
ciscoiosMatch12.4\(15\)xz2
OR
ciscoiosMatch12.4\(15\)xz1
OR
ciscoiosMatch12.4\(15\)xl3
OR
ciscoiosMatch12.4\(15\)xl1
OR
ciscoiosMatch12.4\(15\)xl2
OR
ciscoiosMatch12.4\(15\)xl4
OR
ciscoiosMatch12.4\(15\)xl5
OR
ciscoiosMatch12.4\(15\)xl
OR
ciscoiosMatch12.4\(15\)xm1
OR
ciscoiosMatch12.4\(15\)xm2
OR
ciscoiosMatch15.0\(1\)m1
OR
ciscoiosMatch15.0\(1\)m5
OR
ciscoiosMatch15.0\(1\)m4
OR
ciscoiosMatch15.0\(1\)m3
OR
ciscoiosMatch15.0\(1\)m2
OR
ciscoiosMatch15.0\(1\)m6
OR
ciscoiosMatch15.0\(1\)m
OR
ciscoiosMatch15.0\(1\)xa2
OR
ciscoiosMatch15.0\(1\)xa4
OR
ciscoiosMatch15.0\(1\)xa1
OR
ciscoiosMatch15.0\(1\)xa3
OR
ciscoiosMatch15.0\(1\)xa
OR
ciscoiosMatch15.0\(1\)xa5
OR
ciscoiosMatch15.1\(2\)t
OR
ciscoiosMatch15.1\(1\)t1
OR
ciscoiosMatch15.1\(2\)t0a
OR
ciscoiosMatch15.1\(1\)t3
OR
ciscoiosMatch15.1\(2\)t3
OR
ciscoiosMatch15.1\(1\)t2
OR
ciscoiosMatch15.1\(3\)t
OR
ciscoiosMatch15.1\(2\)t2a
OR
ciscoiosMatch15.1\(3\)t1
OR
ciscoiosMatch15.1\(1\)t
OR
ciscoiosMatch15.1\(2\)t2
OR
ciscoiosMatch15.1\(2\)t1
OR
ciscoiosMatch15.1\(1\)xb
OR
ciscoiosMatch15.1\(1\)xb3
OR
ciscoiosMatch15.1\(1\)xb1
OR
ciscoiosMatch15.1\(1\)xb2
OR
ciscoiosMatch15.1\(4\)xb4
OR
ciscoiosMatch15.0\(1\)s2
OR
ciscoiosMatch15.0\(1\)s1
OR
ciscoiosMatch15.0\(1\)s
OR
ciscoiosMatch15.0\(1\)s4
OR
ciscoiosMatch12.4\(20\)mrb
OR
ciscoiosMatch12.4\(20\)mrb1
OR
ciscoiosMatch15.1\(2\)s
OR
ciscoiosMatch15.1\(1\)s
OR
ciscoiosMatch15.1\(1\)s1
OR
ciscoiosMatch15.1\(2\)s1
OR
ciscoiosMatch15.1\(4\)m
OR
ciscoiosMatch15.1\(4\)m0a
OR
ciscoiosMatch15.1\(4\)m0b
OR
ciscoiosMatch15.1\(2\)gc
OR
ciscoiosMatch15.1\(2\)gc1
OR
ciscoiosMatch12.4\(24\)ys3

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.014

Percentile

86.2%

Related for CISCO-SA-20110928-SIP