CERT-In Vulnerability Note
CIVN-2013-0207
Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Original Issue Date:November 21, 2013
Severity Rating: HIGH
Systems Affected
- Cisco IOS Software version 15.1 prior
Overview
A vulnerability have been reported in session initiation protocol functionality of Cisco IOS Software which could allow an unauthenticated, remote attacker to trigger a memory leak or a device reload.
Description
This vulnerability is due to incorrect processing of specially crafted SIP messages. An unauthenticated remote attacker could exploit this vulnerability by sending specific valid SIP messages to the SIP gateway.
Successful exploitation of this vulnerability could allow a remote attacker to cause the device to consume available memory resources or reload, resulting in a Denial of Service condition.
Solution
Apply appropriate updates as mentioned in CISCO advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip
Vendor Information
CISCO
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip
References
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=31562
CVE Name
CVE-2013-5553
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|