A vulnerability in Session Initiation Protocol (SIP) call handling in Cisco IP Phone 8800 Series devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the SIP process unexpectedly restarts. All active phone calls are dropped as the SIP process restarts. The vulnerability is due to incomplete input validation of the SIP packet header. An attacker could exploit this vulnerability by sending a malformed SIP packet to a targeted phone. An exploit could allow the attacker to cause a DoS condition because all phone calls are dropped when the SIP process unexpectedly restarts. Cisco Bug IDs: CSCvc62590.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102003 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039922 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ipp | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-11-30 09:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12328
Mitre link : CVE-2017-12328
CVE.ORG link : CVE-2017-12328
JSON object : View
Products Affected
cisco
- ip_phone_8800_series_firmware
CWE
CWE-20
Improper Input Validation