Cisco Adaptive Security Appliance Software SIP Inspection DoS (cisco-sa-20191002-asa-ftd-sip-dos)

high Nessus Plugin ID 130272

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A denial of service (DoS) vulnerability exists in the Session Initiation Protocol (SIP) inspection module of Cisco Adaptive Security Appliance (ASA) due to improper parsing of SIP messages. An unauthenticated, remote attacker can exploit this issue by sending a malicious SIP packet to an affected device which triggers an integer underflow that causes the software to try to read unmapped memory, resulting in a crash.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvp45882

See Also

http://www.nessus.org/u?fbd25b57

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp45882

Plugin Details

Severity: High

ID: 130272

File Name: cisco-sa-20191002-asa-sip-dos.nasl

Version: 1.5

Type: local

Family: CISCO

Published: 10/25/2019

Updated: 12/20/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2019-12678

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:adaptive_security_appliance_software

Required KB Items: Host/Cisco/ASA

Exploit Ease: No known exploits are available

Patch Publication Date: 10/2/2019

Vulnerability Publication Date: 10/2/2019

Reference Information

CVE: CVE-2019-12678

CISCO-SA: cisco-sa-20191002-asa-ftd-sip-dos

IAVA: 2019-A-0370

CISCO-BUG-ID: CSCvp45882