A vulnerability in Session Initiation Protocol (SIP) call handling in Cisco IP Phone 8800 Series devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition because the SIP process unexpectedly restarts. All active phone calls are dropped as the SIP process restarts. The vulnerability is due to incomplete input validation of the SIP packet header. An attacker could exploit this vulnerability by sending a malformed SIP packet to a targeted phone. An exploit could allow the attacker to cause a DoS condition because all phone calls are dropped when the SIP process unexpectedly restarts. Cisco Bug IDs: CSCvc62590.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-ipp | Vendor Advisory |
http://www.securitytracker.com/id/1039922 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/102003 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-11-30 01:29
Updated : 2019-10-09 16:22
NVD link : CVE-2017-12328
Mitre link : CVE-2017-12328
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
cisco
- ip_phone_8800_series_firmware