ID
VAR-E-200501-0251
TITLE
Cisco IOS Skinny Call Control Protocol Handler Remote Denial Of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS when configured for Cisco IOS Telephony Service (ITS), Cisco CallManager Express (CME), or Survivable Remote Site Telephony (SRST) services is reported prone to a remote denial of service vulnerability.
The issue is reported to exist in the Skinny Call Control Protocol (SCCP) handler.
A remote attacker may exploit this vulnerability continuously to effectively deny network-based services to legitimate users.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zo | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.1yd | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Failure to Handle Exceptional Conditions
Trust: 0.3
CREDITS
Discovery of this vulnerability is credited to SecureTest.
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 12307 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/en/us/products/products_security_advisory09186a00803b3fff.shtml | Trust: 0.3 |
SOURCES
db: | BID | id: | 12307 |
LAST UPDATE DATE
2022-07-27T09:57:56.861000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 12307 | date: | 2005-01-19T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 12307 | date: | 2005-01-19T00:00:00 |