Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105595
Category:CISCO
Title:Cisco Unified Communications Manager Software Session Initiation Protocol Memory Leak Vulnerability
Summary:A vulnerability in the Session Initiation Protocol (SIP) gateway implementation in Cisco Unified Communications Manager Software could allow an unauthenticated, remote attacker to cause a memory leak and eventual reload of an affected device.
Description:Summary:
A vulnerability in the Session Initiation Protocol (SIP) gateway implementation in Cisco Unified Communications Manager Software could allow an unauthenticated, remote attacker to cause a memory leak and eventual reload of an affected device.

Vulnerability Insight:
The vulnerability is due to improper processing of malformed SIP messages. An attacker could exploit this vulnerability by sending malformed SIP messages to be processed by an affected device.

Vulnerability Impact:
An exploit could allow the attacker to cause a memory leak and eventual reload of the affected device.

Affected Software/OS:
Cisco Unified Communications Manager 8.x and < 9.1(2)su4/10.5(2)su3/11.0(1)su1

Solution:
Update to 9.1(2)su4/10.5(2)su3/11.0(1)su1 or newer.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-1350
BugTraq ID: 85372
http://www.securityfocus.com/bid/85372
Cisco Security Advisory: 20160323 Cisco IOS and IOS XE and Cisco Unified Communications Manager Software Session Initiation Protocol Memory Leak Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip
http://www.securitytracker.com/id/1035420
http://www.securitytracker.com/id/1035421
CopyrightThis script is Copyright (C) 2016 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.