This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
Multiple vulnerabilities exist in the Session Initiation Protocol
(SIP) implementation in Cisco IOS Software and Cisco IOS XE Software
that could allow an unauthenticated, remote attacker to cause a reload
of an affected device or trigger memory leaks that may result in
system instabilities. Affected devices would need to be configured to
process SIP messages for these vulnerabilities to be exploitable.
Cisco has released free software updates that address these
vulnerabilities. There are no workarounds for devices that must run
however, mitigations are available to limit exposure to the
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.8
Nessus Plugin ID: 56319 ()
CVE ID: CVE-2011-0939CVE-2011-2072CVE-2011-3275
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.