Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20120926-cucm)

high Nessus Plugin ID 67203

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Cisco Unified Communications Manager contains a vulnerability in its Session Initiation Protocol (SIP) implementation that could allow an unauthenticated, remote attacker to cause a critical service to fail, which could interrupt voice services. Affected devices must be configured to process SIP messages for this vulnerability to be exploitable. Cisco has released free software updates that address this vulnerability. A workaround exists for customers who do not require SIP in their environment. This advisory is available at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/c isco-sa-20120926-cucm.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20120926-cucm.

See Also

http://www.nessus.org/u?019686f6

Plugin Details

Severity: High

ID: 67203

File Name: cisco-sa-20120926-cucm.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 7/8/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2012

Vulnerability Publication Date: 9/26/2012

Reference Information

CVE: CVE-2012-3949

BID: 55697

CISCO-SA: cisco-sa-20120926-cucm

CISCO-BUG-ID: CSCtj33003