{"vuid":"VU#438176","idnumber":"438176","name":"Cisco IOS fails to properly handle Session Initiated Protocol packets","keywords":["Cisco","IOS","DoS","denial of service","reload","SIP","Session Initiated Protocol","5060/udp"],"overview":"Cisco devices that run IOS and support voice traffic fail to properly handle Session Initiated Protocol packets. Exploitation of this vulnerability may result in a denial-of-service condition.","clean_desc":"Cisco IOS is an operating system that is used on Cisco network devices. According to Cisco, \"Session Initiation Protocol (SIP) is the Internet Engineering Task Force's (IETF's) standard for multimedia conferencing over IP. SIP is an ASCII-based, application-layer control protocol (defined in RFC 2543) that can be used to establish, maintain, and terminate calls between two or more end points.\" SIP typically operates on ports 5060/udp and 5060/tcp. Cisco devices that run IOS and support voice traffic may have SIP enabled by default but not properly configured. Cisco devices with this configuration contain an unspecified vulnerability that may cause the device to reboot when a SIP packet is processed. For more information, including a list of affected products and versions of IOS refer to Cisco Security Advisory: cisco-sa-20070131-sip.","impact":"A remote, unauthenticated attacker with the ability to send a specially crafted packet to an affected Cisco device may be able to cause that device to reboot. Sustained exploitation of this vulnerability may result in a denial-of-service. Because devices running IOS may transit traffic for a number of other networks, the secondary impacts of a denial of service may be severe.","resolution":"Upgrade to an unaffected version of IOS\nSee the Software Version and Fixes section of Cisco Security Advisory: cisco-sa-20070131-sip for information on available upgrades.","workarounds":"Turn off SIP processing Disabling SIP if it is not needed will prevent this vulnerability from being exploited. For instructions on how to turn off SIP processing, refer to the Workarounds section of  Cisco Security Advisory cisco-sa-20070131-sip. Restrict Access Cisco does not have any examples of a properly configured SIP router being affected by this vulnerability. If you do not need SIP processed on your router, you can also restrict public access to SIP (udp 5060 and TCP 5060) on your router from the edge of your network. Other workarounds and mitigation strategies can be found in the Cisco Applied Intelligence Response: Identifying and Mitigating Exploitation of the SIP Packet Reloads IOS Devices Not Configured for SIP Vulnerability document.","sysaffected":"","thanks":"This vulnerability was reported in Cisco Security Advisory: cisco-sa-20070131-sip","author":"This document was written by Jeff Gennari based on information from Cisco.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml","http://www.cisco.com/en/US/products/products_security_response09186a00807d36f5.html","http://secunia.com/advisories/23978/","http://www.cisco.com/univercd/cc/td/doc/product/voice/sipsols/biggulp/bgsipov.htm","http://tools.ietf.org/html/rfc2543","http://securitytracker.com/alerts/2007/Jan/1017575.html","http://www.securityfocus.com/bid/22330"],"cveids":["CVE-2007-0648"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-31T12:33:38Z","publicdate":"2007-01-31T00:00:00Z","datefirstpublished":"2007-01-31T14:08:05Z","dateupdated":"2007-02-08T19:06:15Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"20","cam_population":"20","cam_impact":"7","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"33.075","cam_scorecurrentwidelyknown":"36.75","cam_scorecurrentwidelyknownexploited":"44.1","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":33.075,"vulnote":null}