Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20090923-sip)

This script is (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

A vulnerability exists in the Session Initiation Protocol (SIP)
implementation in Cisco IOS Software that could allow an
unauthenticated attacker to cause a denial of service (DoS) condition
on an affected device when the Cisco Unified Border Element feature is
enabled.
Cisco has released free software updates that address this
vulnerability. For devices that must run SIP there are no workarounds

however, mitigations are available to limit exposure of the
vulnerability.

See also :

http://www.nessus.org/u?b08fdf59
http://www.nessus.org/u?6e51f7b2

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090923-sip.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 49046 (cisco-sa-20090923-siphttp.nasl)

Bugtraq ID: 36499

CVE ID: CVE-2009-2870