Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105723
Category:CISCO
Title:Cisco Video Communication Server Session Initiation Protocol Packet Processing Denial of Service Vulnerability (cisco-sa-20160516-vcs)
Summary:A vulnerability in the Session Initiation Protocol (SIP); implementation of the Cisco Video Communications Server (VCS) could allow an unauthenticated,; remote attacker to cause a denial of service (DoS) condition.
Description:Summary:
A vulnerability in the Session Initiation Protocol (SIP)
implementation of the Cisco Video Communications Server (VCS) could allow an unauthenticated,
remote attacker to cause a denial of service (DoS) condition.

Vulnerability Insight:
The vulnerability is due to a malformed SIP header message. An
attacker could exploit this vulnerability by manipulating the SIP URI.

Vulnerability Impact:
An exploit could allow the attacker to cause a disruption of
service to the application.

Affected Software/OS:
Cisco TelePresence VCS version X8.x prior to X8.7.2.

Solution:
Update to version X8.7.2 or higher.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-1400
Cisco Security Advisory: 20160516 Cisco Video Communication Server Session Initiation Protocol Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160516-vcs
http://www.securitytracker.com/id/1035899
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.