Unspecified vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS 12.2 through 12.4 and Unified Communications Manager 4.1 through 6.1, when VoIP is configured, allows remote attackers to cause a denial of service (device or process reload) via unspecified valid SIP messages, aka Cisco Bug ID CSCsu38644, a different vulnerability than CVE-2008-3801 and CVE-2008-3802.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31990 - Third Party Advisory | |
References | () http://secunia.com/advisories/32013 - Third Party Advisory | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml - Vendor Advisory | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/31367 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1020939 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1020942 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2008/2670 - Permissions Required | |
References | () http://www.vupen.com/english/advisories/2008/2671 - Permissions Required | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6086 - Broken Link |
02 Jun 2022, 17:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:ios:12.4:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:12.3:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:* |
References | (CISCO) http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0156a.shtml - Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1020939 - Broken Link, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2671 - Permissions Required | |
References | (SECUNIA) http://secunia.com/advisories/31990 - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2670 - Permissions Required | |
References | (SECTRACK) http://www.securitytracker.com/id?1020942 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/31367 - Third Party Advisory, VDB Entry | |
References | (CISCO) http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01562.shtml - Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/32013 - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6086 - Broken Link |
Information
Published : 2008-09-26 16:21
Updated : 2025-04-09 00:30
NVD link : CVE-2008-3800
Mitre link : CVE-2008-3800
CVE.ORG link : CVE-2008-3800
JSON object : View
Products Affected
cisco
- ios
- unified_communications_manager
- unified_callmanager
CWE