A vulnerability in Session Initiation Protocol (SIP) call handling in Cisco IP Phone 8800 Series devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the SIP process unexpectedly restarts. All active phone calls are dropped as the SIP process restarts. The vulnerability is due to incomplete input validation of the SIP packet header. An attacker could exploit this vulnerability by sending a malformed SIP packet to a targeted phone. An exploit could allow the attacker to cause a DoS condition because all phone calls are dropped when the SIP process unexpectedly restarts. Cisco Bug IDs: CSCvc62590.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102003 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039922 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ipp | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2017-11-30T09:00:00
Updated: 2017-12-02T10:57:01
Reserved: 2017-08-03T00:00:00
Link: CVE-2017-12328
JSON object: View
NVD Information
Status : Modified
Published: 2017-11-30T09:29:00.260
Modified: 2019-10-09T23:22:57.293
Link: CVE-2017-12328
JSON object: View
Redhat Information
No data.
CWE