ID

VAR-E-200302-0154


TITLE

Multiple Vendor Session Initiation Protocol Vulnerabilities

Trust: 0.3

sources: BID: 6904

DESCRIPTION

The Oulu University Secure Programming Group has reported numerous vulnerabilities in Session Initiation Protocol (SIP) implementations. These issues may be exploited to cause a denial of services in devices which implement the protocol. It has also been reported that unauthorized access to devices may occur under some circumstances.
These issues are related to handling of SIP INVITE messages.
Exploitation and the specific nature of each vulnerability may depend on the particular implementation.

Trust: 0.3

sources: BID: 6904

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2 xescope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xhscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xascope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 xd1scope: - version: -

Trust: 0.6

vendor:partysipmodel:partysipscope:eqversion:0.5.5

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.4

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.3-1

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.3

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.2-1

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.2

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.1-1

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.1

Trust: 0.3

vendor:partysipmodel:partysipscope:eqversion:0.5.0

Trust: 0.3

vendor:nortelmodel:networks succession communication server compactscope:eqversion:2000-

Trust: 0.3

vendor:nortelmodel:networks succession communication serverscope:eqversion:2000

Trust: 0.3

vendor:iptelmodel:sip express routerscope:eqversion:0.8.9

Trust: 0.3

vendor:iptelmodel:sip express routerscope:eqversion:0.8.8

Trust: 0.3

vendor:gnumodel:osipscope:eqversion:0.9.5

Trust: 0.3

vendor:dymanicsoftmodel:java sip user agentscope:eqversion:6.0

Trust: 0.3

vendor:dymanicsoftmodel:java sip user agentscope:eqversion:5.0

Trust: 0.3

vendor:dymanicsoftmodel:c++ sip user agentscope: - version: -

Trust: 0.3

vendor:dymanicsoftmodel:appenginescope: - version: -

Trust: 0.3

vendor:columbiamodel:university sipcscope:eqversion:1.74

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1.200)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:7960

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:7940

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xu2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xt3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xk2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xj1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xi2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xi1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xh3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xh2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xb4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xb3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xs1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xe3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xe2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xdscope: - version: -

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:partysipmodel:partysipscope:neversion:0.5.6

Trust: 0.3

vendor:iptelmodel:sip express routerscope:neversion:0.8.10

Trust: 0.3

vendor:gnumodel:osipscope:neversion:0.9.6

Trust: 0.3

vendor:columbiamodel:university sipcscope:neversion:2.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:ios 12.2 t1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 t3scope:neversion: -

Trust: 0.3

sources: BID: 6904

EXPLOIT

Proof of concept exploits have been made available in the PROTOS Test-Suite: c07-sip, distributed by The Oulu University Secure Programming Group. See the appropriate link in vulnerability references for additional details.

Trust: 0.3

sources: BID: 6904

PRICE

Free

Trust: 0.3

sources: BID: 6904

TYPE

Unknown

Trust: 0.3

sources: BID: 6904

CREDITS

Discovery is credited to the Oulu University Secure Programming Group.

Trust: 0.3

sources: BID: 6904

EXTERNAL IDS

db:CERT/CCid:VU#528719

Trust: 0.3

db:BIDid:6904

Trust: 0.3

sources: BID: 6904

REFERENCES

url:http://www.kb.cert.org/vuls/id/528719

Trust: 0.3

url:http://www.dynamicsoft.com/support/advisory/ca-2003-06.php

Trust: 0.3

url:http://www.iptel.org/

Trust: 0.3

url:http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/

Trust: 0.3

url:http://www.cert.org/advisories/ca-2003-06.html

Trust: 0.3

url:http://www.fsf.org/software/osip/osip.html

Trust: 0.3

url:http://support.avaya.com/japple/css/japple?temp.groupid=128450&temp.selectedfamily=128451&temp.selectedproduct=154235&temp.selectedbucket=126655&temp.feedbackstate=askforfeedback&temp.documentid=16123

Trust: 0.3

url:http://www.partysip.org/

Trust: 0.3

sources: BID: 6904

SOURCES

db:BIDid:6904

LAST UPDATE DATE

2022-07-27T10:02:24.597000+00:00


SOURCES UPDATE DATE

db:BIDid:6904date:2003-02-21T00:00:00

SOURCES RELEASE DATE

db:BIDid:6904date:2003-02-21T00:00:00