Cisco IOS SIP Packet Handling Remote DoS (CSCsh58082)

high Nessus Plugin ID 24740

Synopsis

The remote CISCO device can be crashed remotely.

Description

The remote version of IOS contains a flaw that could cause the remote router to crash when it receives a malicious SIP (Session Initiation Protocol) packet.

An attacker might use these flaws to disable this device remotely.

Solution

http://www.nessus.org/u?15ec02fb

Plugin Details

Severity: High

ID: 24740

File Name: CSCsh58082.nasl

Version: 1.18

Type: remote

Family: CISCO

Published: 3/1/2007

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community, CISCO/model

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/31/2007

Reference Information

CVE: CVE-2007-0648

BID: 22330