This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
Skinny Client Control Protocol (SCCP) crafted messages may cause a
Cisco IOS device that is configured with the Network Address
Translation (NAT) SCCP Fragmentation Support feature to reload. Cisco
has released free software updates that address this vulnerability. A
workaround that mitigates this vulnerability is available.
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.8
Nessus Plugin ID: 49053 (cisco-sa-20100324-sccphttp.nasl)
CVE ID: CVE-2010-0584