Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerabilities (cisco-sa-20110928-sip)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

Multiple vulnerabilities exist in the Session Initiation Protocol
(SIP) implementation in Cisco IOS Software and Cisco IOS XE Software
that could allow an unauthenticated, remote attacker to cause a reload
of an affected device or trigger memory leaks that may result in
system instabilities. Affected devices would need to be configured to
process SIP messages for these vulnerabilities to be exploitable.
Cisco has released free software updates that address these
vulnerabilities. There are no workarounds for devices that must run
SIP
however, mitigations are available to limit exposure to the
vulnerabilities.

See also :

http://www.nessus.org/u?f2735135

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20110928-sip.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Family: CISCO

Nessus Plugin ID: 56319 ()

Bugtraq ID:

CVE ID: CVE-2011-0939
CVE-2011-2072
CVE-2011-3275