Cisco IOS SIP Memory Leak DoS (CSCuj23293)

high Nessus Plugin ID 90310

Synopsis

The remote device is affected by denial of service vulnerability.

Description

According to its self-reported version, the Cisco IOS software running on the remote device is affected by a denial of service vulnerability in the Session Initiation Protocol (SIP) gateway implementation due to improper handling of malformed SIP messages. An unauthenticated, remote attacker can exploit this, via crafted SIP messages, to cause memory leakage, resulting in an eventual reload of the affected device.

Solution

Apply the relevant patch referenced in the Cisco security advisory.

See Also

http://www.nessus.org/u?ddc3f527

https://quickview.cloudapps.cisco.com/quickview/bug/CSCuj23293

Plugin Details

Severity: High

ID: 90310

File Name: cisco-sa-20160323-sip-ios.nasl

Version: 1.11

Type: combined

Family: CISCO

Published: 4/1/2016

Updated: 12/1/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2016-1350

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2016

Vulnerability Publication Date: 3/23/2016

Reference Information

CVE: CVE-2016-1350

CISCO-SA: cisco-sa-20160323-sip

CISCO-BUG-ID: CSCuj23293