Show plain JSON{"id": "CVE-2003-1109", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2003-12-31T05:00:00.000", "references": [{"url": "http://www.cert.org/advisories/CA-2003-06.html", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/528719", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/6904", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1006143", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1006144", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1006145", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11379", "source": "cve@mitre.org"}, {"url": "http://www.cert.org/advisories/CA-2003-06.html", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/528719", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/6904", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1006143", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1006144", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1006145", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11379", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "915157AA-15BE-4792-95D8-4D1E1EF34EB7"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38C9EE3-1A86-4930-AEF7-EAC3A2713DF5"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "742CC70E-68FB-4658-A475-E7BBC5983878"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10CE5741-1569-4B69-B7F7-094F0C6101AA"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9B4D71A-D418-4E6B-88F7-50833C00236C"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDD14702-51AC-46B1-95A3-4AD47A4DCD21"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA8E55E-7E11-4D46-A1BC-B3655906FDF8"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E16ED18-4EB6-40D5-A857-6398A78693D9"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "979D4077-A3CB-4134-B180-EF10F01413BC"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C96C90-8B2D-4A88-A4B8-FA43332BD8D9"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C9B3920-D3F1-478F-ADE9-6022763E8740"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BC9CF50-E0F7-4513-B7EB-A2E095D3E194"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1A3E8C4-0E94-4027-ABDE-47A364071D1E"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07398411-7920-4B52-92C8-3696F49370B2"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "371FA715-3966-4071-961F-12E691608DB2"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E2713E8-3E4B-4C60-9ABD-01B962A85A9C"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5400D72E-CD49-41E7-BA47-33E3AB920320"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A44418C-C041-4A98-9D1F-1E7510B9AD1A"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "474FA3DA-6967-48A6-AAB4-E7C382D3C942"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E319FE1E-8D75-4CA2-8EA9-C1C32C290891"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B82C4003-D2CD-4243-8A8D-B8A9B449D096"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29056463-CDD9-4399-964E-14BDBFF760A0"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "259BD3FC-FFC5-44B7-8641-917A1BF2E98C"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34F414DF-19C3-42BC-B43D-5CF60A3C0991"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E32D7BFD-EC96-464D-81CB-E9CC12C21EC0"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32421120-BCA2-4218-8CB3-C77452A69295"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B03537E8-D899-44D5-976D-A6E10FF16FF5"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C4C67B0-81D3-4430-A9F7-6F15C601693E"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "520E6B5D-C163-4633-A2DC-D02335838FDA"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA145839-3DC4-41C4-96B7-88B8EE87D70E"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC95C37-9102-45C7-813A-15A0ACFF5D5F"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8D649D-474E-4661-A68E-517EA3563CAA"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0FEB158-215B-4C9D-8882-D44EE7F90B60"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1BD8E31-5117-4E79-92A4-5FF08BC8BB60"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "274DF264-D0DE-46DC-A91F-DD53ACE06AAD"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC678F0D-4307-48B9-8C29-9E85DB756809"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92A9D069-4C88-4BE1-92E3-8A7056DD8825"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289"}, {"criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ip_phone_7940:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7F39E4B-C895-42E2-A7A7-C7026D17BE0D"}, {"criteria": "cpe:2.3:h:cisco:ip_phone_7960:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6E77332-1288-409C-8A5F-435E4A866EF5"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "626E41D2-A5EF-493D-9486-3D9BC3793EAC"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBA31E4D-2215-4E4A-BCCC-B3D922CB752D"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(3.210\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F16AD2C-1CC1-43D9-A944-F67071B62E66"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25D16481-CA9A-4B4D-AC9D-3A4F0387FF19"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(7\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56E4588E-6C1F-4720-8082-0EF299435CB9"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED24C763-7558-4AC0-AE10-FDA3D3078D27"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1.200\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C84CE24E-4ED6-43D0-A234-FBD24D22A8A2"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72C3E2B4-3A36-44B5-90D3-1BF9FAD98579"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482"}, {"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}