[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cisco Security Advisory: Cisco Unified Communications Manager IM and Presence Service SIP Packet Processing Denial of Service Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Cisco Security Advisory: Cisco Unified Communications Manager IM and Presence Service SIP Packet Processing Denial of Service Vulnerability
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Wed, 3 Aug 2016 12:09:29 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Cisco Unified Communications Manager IM and Presence
Service SIP Packet Processing Denial of Service Vulnerability
Advisory ID: cisco-sa-20160803-ucm
Revision 1.0
For Public Release 2016 August 3 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
A vulnerability in Session Initiation Protocol (SIP) processing functions of
the Cisco Unified Communications Manager Instant Messaging (IM) and Presence
Service could allow an unauthenticated, remote attacker to cause the Cisco SIP
Proxy Daemon (sipd) process to restart unexpectedly, resulting in a denial of
service (DoS) condition on a targeted system.
The vulnerability is due to improper input validation of SIP packet headers. An
attacker could exploit this vulnerability by sending a crafted SIP packet to a
targeted system. A successful exploit could allow the attacker to cause the
sipd process to restart unexpectedly, resulting in a DoS condition on the
system. If the sipd process restarts repeatedly, a successful exploit could
also result in a sustained DoS condition and cause high disk utilization due to
a large number of sipd core files being written to disk, which could exacerbate
the DoS condition.
Cisco has released software updates that address this vulnerability. There are
no workarounds that address this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-ucm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)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=IwC/
-----END PGP SIGNATURE-----