Vulnerabilities > CVE-2005-0186 - Denial-Of-Service vulnerability in IOS

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
cisco
nessus

Summary

Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port.

Vulnerable Configurations

Part Description Count
OS
Cisco
4

Nessus

  • NASL familyCISCO
    NASL idCISCO-SA-20050119-ITSCMEHTTP.NASL
    descriptionCisco Internetwork Operating System (IOS) Software release trains 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the Cisco IOS Telephony Service (ITS), Cisco CallManager Express (CME) or Survivable Remote Site Telephony (SRST) may contain a vulnerability in processing certain malformed control protocol messages.
    last seen2019-10-28
    modified2010-09-01
    plugin id48979
    published2010-09-01
    reporterThis script is (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/48979
    titleVulnerability in Cisco IOS Embedded Call Processing Solutions - Cisco Systems
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    # Security advisory is (C) CISCO, Inc.
    # See https://www.cisco.com/en/US/products/products_security_advisory09186a00803b3fff.shtml
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
     script_id(48979);
     script_version("1.18");
     script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");
     script_cve_id("CVE-2005-0186");
     script_bugtraq_id(12307);
     script_name(english:"Vulnerability in Cisco IOS Embedded Call Processing Solutions - Cisco Systems");
     script_summary(english:"Checks the IOS version.");
     script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
     script_set_attribute(attribute:"description", value:
    'Cisco Internetwork Operating System (IOS) Software release trains
    12.1YD, 12.2T, 12.3 and 12.3T, when configured for the Cisco IOS
    Telephony Service (ITS), Cisco CallManager Express (CME) or Survivable
    Remote Site Telephony (SRST) may contain a vulnerability in processing
    certain malformed control protocol messages.'
     );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9ca1d056");
     # https://www.cisco.com/en/US/products/products_security_advisory09186a00803b3fff.shtml
     script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?0e41b5df");
     script_set_attribute(attribute:"solution", value:
    "Apply the relevant patch referenced in Cisco Security Advisory
    cisco-sa-20050119-itscme.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2005/01/19");
     script_set_attribute(attribute:"patch_publication_date", value:"2005/01/19");
     script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01");
    
     script_end_attributes();
     script_xref(name:"CISCO-BUG-ID", value:"CSCee08584");
     script_xref(name:"CISCO-SA", value:"cisco-sa-20050119-itscme");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc.");
     script_family(english:"CISCO");
     script_dependencie("cisco_ios_version.nasl");
     script_require_keys("Host/Cisco/IOS/Version");
     exit(0);
    }
    
    include("audit.inc");
    include("cisco_func.inc");
    include("cisco_kb_cmd_func.inc");
    
    flag = 0;
    version = get_kb_item_or_exit("Host/Cisco/IOS/Version");
    override = 0;
    
    if (version == '12.3(2)XZ2') flag++;
    else if (version == '12.3(2)XZ1') flag++;
    else if (version == '12.3(2)XZ') flag++;
    else if (version == '12.3(4)XQ') flag++;
    else if (version == '12.3(4)XK') flag++;
    else if (version == '12.3(7)XJ1') flag++;
    else if (version == '12.3(7)XJ') flag++;
    else if (version == '12.3(4)XG1') flag++;
    else if (version == '12.3(4)XG') flag++;
    else if (version == '12.3(2)XF') flag++;
    else if (version == '12.3(2)XE') flag++;
    else if (version == '12.3(4)XD4') flag++;
    else if (version == '12.3(4)XD3') flag++;
    else if (version == '12.3(4)XD2') flag++;
    else if (version == '12.3(4)XD1') flag++;
    else if (version == '12.3(4)XD') flag++;
    else if (version == '12.3(2)XC2') flag++;
    else if (version == '12.3(2)XC') flag++;
    else if (version == '12.3(2)XB3') flag++;
    else if (version == '12.3(2)XB1') flag++;
    else if (version == '12.3(2)XB') flag++;
    else if (version == '12.3(2)XA4') flag++;
    else if (version == '12.3(2)XA1') flag++;
    else if (version == '12.3(2)XA') flag++;
    else if (version == '12.3(7)T') flag++;
    else if (version == '12.3(4)T4') flag++;
    else if (version == '12.3(4)T3') flag++;
    else if (version == '12.3(4)T2a') flag++;
    else if (version == '12.3(4)T2') flag++;
    else if (version == '12.3(4)T1') flag++;
    else if (version == '12.3(4)T') flag++;
    else if (version == '12.3(2)T6') flag++;
    else if (version == '12.3(2)T5') flag++;
    else if (version == '12.3(2)T4') flag++;
    else if (version == '12.3(2)T3') flag++;
    else if (version == '12.3(2)T2') flag++;
    else if (version == '12.3(2)T1') flag++;
    else if (version == '12.3(2)T') flag++;
    else if (version == '12.3(5a)B5') flag++;
    else if (version == '12.3(5a)B4') flag++;
    else if (version == '12.3(5a)B3') flag++;
    else if (version == '12.3(5a)B2') flag++;
    else if (version == '12.3(5a)B1') flag++;
    else if (version == '12.3(5a)B') flag++;
    else if (version == '12.3(3)B1') flag++;
    else if (version == '12.3(3)B') flag++;
    else if (version == '12.3(1a)B') flag++;
    else if (version == '12.3(6b)') flag++;
    else if (version == '12.3(6a)') flag++;
    else if (version == '12.3(6)') flag++;
    else if (version == '12.3(5c)') flag++;
    else if (version == '12.3(5b)') flag++;
    else if (version == '12.3(5a)') flag++;
    else if (version == '12.3(5)') flag++;
    else if (version == '12.3(3g)') flag++;
    else if (version == '12.3(3f)') flag++;
    else if (version == '12.3(3e)') flag++;
    else if (version == '12.3(3c)') flag++;
    else if (version == '12.3(3b)') flag++;
    else if (version == '12.3(3a)') flag++;
    else if (version == '12.3(3)') flag++;
    else if (version == '12.3(1a)') flag++;
    else if (version == '12.3(1)') flag++;
    else if (version == '12.2(13)ZP4') flag++;
    else if (version == '12.2(13)ZP3') flag++;
    else if (version == '12.2(13)ZP2') flag++;
    else if (version == '12.2(13)ZP1') flag++;
    else if (version == '12.2(13)ZP') flag++;
    else if (version == '12.2(15)ZL1') flag++;
    else if (version == '12.2(15)ZL') flag++;
    else if (version == '12.2(15)ZJ5') flag++;
    else if (version == '12.2(15)ZJ3') flag++;
    else if (version == '12.2(15)ZJ2') flag++;
    else if (version == '12.2(15)ZJ1') flag++;
    else if (version == '12.2(15)ZJ') flag++;
    else if (version == '12.2(13)ZH5') flag++;
    else if (version == '12.2(13)ZH3') flag++;
    else if (version == '12.2(13)ZH2') flag++;
    else if (version == '12.2(13)ZH') flag++;
    else if (version == '12.2(13)ZF2') flag++;
    else if (version == '12.2(13)ZF1') flag++;
    else if (version == '12.2(13)ZF') flag++;
    else if (version == '12.2(13)ZE') flag++;
    else if (version == '12.2(13)ZD4') flag++;
    else if (version == '12.2(13)ZD3') flag++;
    else if (version == '12.2(13)ZD2') flag++;
    else if (version == '12.2(13)ZD1') flag++;
    else if (version == '12.2(13)ZD') flag++;
    else if (version == '12.2(13)ZC') flag++;
    else if (version == '12.2(8)ZB8') flag++;
    else if (version == '12.2(8)ZB7') flag++;
    else if (version == '12.2(8)ZB6') flag++;
    else if (version == '12.2(8)ZB5') flag++;
    else if (version == '12.2(8)ZB4a') flag++;
    else if (version == '12.2(8)ZB4') flag++;
    else if (version == '12.2(8)ZB3') flag++;
    else if (version == '12.2(8)ZB2') flag++;
    else if (version == '12.2(8)ZB1') flag++;
    else if (version == '12.2(8)YY4') flag++;
    else if (version == '12.2(8)YY3') flag++;
    else if (version == '12.2(8)YY2') flag++;
    else if (version == '12.2(8)YY1') flag++;
    else if (version == '12.2(8)YY') flag++;
    else if (version == '12.2(8)YW3') flag++;
    else if (version == '12.2(8)YW2') flag++;
    else if (version == '12.2(8)YW1') flag++;
    else if (version == '12.2(8)YW') flag++;
    else if (version == '12.2(11)YV') flag++;
    else if (version == '12.2(11)YU') flag++;
    else if (version == '12.2(11)YT2') flag++;
    else if (version == '12.2(11)YT1') flag++;
    else if (version == '12.2(11)YT') flag++;
    else if (version == '12.2(8)YN1') flag++;
    else if (version == '12.2(8)YN') flag++;
    else if (version == '12.2(8)YM') flag++;
    else if (version == '12.2(8)YL') flag++;
    else if (version == '12.2(8)YJ') flag++;
    else if (version == '12.2(4)YH') flag++;
    else if (version == '12.2(8)YD3') flag++;
    else if (version == '12.2(8)YD2') flag++;
    else if (version == '12.2(8)YD1') flag++;
    else if (version == '12.2(8)YD') flag++;
    else if (version == '12.2(2)YC4') flag++;
    else if (version == '12.2(2)YC3') flag++;
    else if (version == '12.2(2)YC2') flag++;
    else if (version == '12.2(2)YC1') flag++;
    else if (version == '12.2(2)YC') flag++;
    else if (version == '12.2(4)YB') flag++;
    else if (version == '12.2(4)YA7') flag++;
    else if (version == '12.2(4)YA6') flag++;
    else if (version == '12.2(4)YA2') flag++;
    else if (version == '12.2(4)YA1') flag++;
    else if (version == '12.2(4)YA') flag++;
    else if (version == '12.2(4)XW') flag++;
    else if (version == '12.2(2)XU') flag++;
    else if (version == '12.2(2)XT3') flag++;
    else if (version == '12.2(2)XT2') flag++;
    else if (version == '12.2(2)XT') flag++;
    else if (version == '12.2(4)XM4') flag++;
    else if (version == '12.2(4)XM3') flag++;
    else if (version == '12.2(4)XM2') flag++;
    else if (version == '12.2(4)XM') flag++;
    else if (version == '12.2(2)XG') flag++;
    else if (version == '12.2(2)XB8') flag++;
    else if (version == '12.2(2)XB7') flag++;
    else if (version == '12.2(2)XB6') flag++;
    else if (version == '12.2(2)XB5') flag++;
    else if (version == '12.2(2)XB3') flag++;
    else if (version == '12.2(2)XB2') flag++;
    else if (version == '12.2(2)XB15') flag++;
    else if (version == '12.2(2)XB14') flag++;
    else if (version == '12.2(2)XB11') flag++;
    else if (version == '12.2(15)T9') flag++;
    else if (version == '12.2(15)T8') flag++;
    else if (version == '12.2(15)T7') flag++;
    else if (version == '12.2(15)T5') flag++;
    else if (version == '12.2(15)T4e') flag++;
    else if (version == '12.2(15)T4') flag++;
    else if (version == '12.2(15)T2') flag++;
    else if (version == '12.2(15)T12') flag++;
    else if (version == '12.2(15)T11') flag++;
    else if (version == '12.2(15)T10') flag++;
    else if (version == '12.2(15)T1') flag++;
    else if (version == '12.2(15)T') flag++;
    else if (version == '12.2(13)T9') flag++;
    else if (version == '12.2(13)T8') flag++;
    else if (version == '12.2(13)T5') flag++;
    else if (version == '12.2(13)T4') flag++;
    else if (version == '12.2(13)T3') flag++;
    else if (version == '12.2(13)T2') flag++;
    else if (version == '12.2(13)T13') flag++;
    else if (version == '12.2(13)T12') flag++;
    else if (version == '12.2(13)T11') flag++;
    else if (version == '12.2(13)T10') flag++;
    else if (version == '12.2(13)T1a') flag++;
    else if (version == '12.2(13)T1') flag++;
    else if (version == '12.2(13)T') flag++;
    else if (version == '12.2(11)T9') flag++;
    else if (version == '12.2(11)T8') flag++;
    else if (version == '12.2(11)T6') flag++;
    else if (version == '12.2(11)T5') flag++;
    else if (version == '12.2(11)T4') flag++;
    else if (version == '12.2(11)T3') flag++;
    else if (version == '12.2(11)T2') flag++;
    else if (version == '12.2(11)T11') flag++;
    else if (version == '12.2(11)T10') flag++;
    else if (version == '12.2(11)T1') flag++;
    else if (version == '12.2(11)T') flag++;
    else if (version == '12.2(8)T8') flag++;
    else if (version == '12.2(8)T5') flag++;
    else if (version == '12.2(8)T4') flag++;
    else if (version == '12.2(8)T3') flag++;
    else if (version == '12.2(8)T2') flag++;
    else if (version == '12.2(8)T10') flag++;
    else if (version == '12.2(8)T1') flag++;
    else if (version == '12.2(8)T') flag++;
    else if (version == '12.2(15)MC1c') flag++;
    else if (version == '12.2(15)MC1b') flag++;
    else if (version == '12.2(15)MC1a') flag++;
    else if (version == '12.2(8)BY2') flag++;
    else if (version == '12.2(8)BY1') flag++;
    else if (version == '12.2(8)BY') flag++;
    else if (version == '12.2(16)BX3') flag++;
    else if (version == '12.2(16)BX2') flag++;
    else if (version == '12.2(16)BX1') flag++;
    else if (version == '12.2(16)BX') flag++;
    else if (version == '12.2(16)B2') flag++;
    else if (version == '12.2(16)B1') flag++;
    else if (version == '12.2(16)B') flag++;
    else if (version == '12.2(15)B') flag++;
    else if (version == '12.1(5)YI2') flag++;
    else if (version == '12.1(5)YI1') flag++;
    else if (version == '12.1(5)YI') flag++;
    else if (version == '12.1(5)YE5') flag++;
    else if (version == '12.1(5)YE4') flag++;
    else if (version == '12.1(5)YE3') flag++;
    else if (version == '12.1(5)YE2') flag++;
    else if (version == '12.1(5)YE1') flag++;
    else if (version == '12.1(5)YD6') flag++;
    else if (version == '12.1(5)YD5') flag++;
    else if (version == '12.1(5)YD4') flag++;
    else if (version == '12.1(5)YD3') flag++;
    else if (version == '12.1(5)YD2') flag++;
    else if (version == '12.1(5)YD1') flag++;
    else if (version == '12.1(5)YD') flag++;
    
    if (get_kb_item("Host/local_checks_enabled"))
    {
      if (flag)
      {
        flag = 0;
        buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config");
        if (check_cisco_result(buf))
        {
          if (preg(pattern:"telephony-service", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"call-manager-fallback", multiline:TRUE, string:buf)) { flag = 1; }
        } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
      }
    }
    
    if (flag)
    {
      security_warning(port:0, extra:cisco_caveat(override));
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCISCO
    NASL idCSCEE08584.NASL
    descriptionThe remote router contains a version of IOS which has flaw in its telephony service. If the remote router is configured for ITS, CME or SRST, then an attacker may send malformed TCP queries to the remote host resulting in a reboot of the router. CISCO identifies this vulnerability as bug id CSCee08584
    last seen2020-06-01
    modified2020-06-02
    plugin id16217
    published2005-01-19
    reporterThis script is (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16217
    titleCisco IOS SCCP Control Protocol Malformed Message DoS (CSCee08584)
    code
    #
    # (C) Tenable Network Security
    #
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(16217);
     script_cve_id("CVE-2005-0186");
     script_bugtraq_id(12307);
     script_version("1.17");
    
     script_name(english:"Cisco IOS SCCP Control Protocol Malformed Message DoS (CSCee08584)");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote device is missing a vendor-supplied security patch" );
     script_set_attribute(attribute:"description", value:
    "The remote router contains a version of IOS which has flaw in its telephony
    service.
    
    If the remote router is configured for ITS, CME or SRST, then an attacker
    may send malformed TCP queries to the remote host resulting in a reboot
    of the router.
    
    CISCO identifies this vulnerability as bug id CSCee08584" );
     script_set_attribute(attribute:"solution", value:
    "http://www.cisco.com/en/US/products/products_security_advisory09186a00803b3fff.shtml" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/01/19");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/01/19");
     script_cvs_date("Date: 2018/06/27 18:42:25");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
     script_end_attributes();
    
    
     summary["english"] = "Uses SNMP to determine if a flaw is present";
     script_summary(english:summary["english"]);
    
     script_category(ACT_GATHER_INFO);
    
     script_copyright(english:"This script is (C) 2005-2018 Tenable Network Security, Inc.");
    
     script_family(english:"CISCO");
    
     script_dependencie("snmp_sysDesc.nasl",
    			 "snmp_cisco_type.nasl");
     script_require_keys("SNMP/community",
    			  "SNMP/sysDesc",
    			  "CISCO/model");
     exit(0);
    }
    
    
    # The code starts here
    ok=0;
    os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);
    hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0);
    
    
    
    
    # Check for the required operating system...
    #----------------------------------------------------------------
    # Is this IOS ?
    if(!egrep(pattern:".*(Internetwork Operating|IOS).*", string:os))exit(0);
    # 12.1YD
    if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)YD[0-9]*,"))ok=1;
    
    # 12.1YE
    if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)YE[0-9]*,"))ok=1;
    
    # 12.1YI
    if(egrep(string:os, pattern:"(12\.1\([0-9]*\)|12\.1)YI[0-9]*,"))ok=1;
    
    # 12.2B
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)B[0-9]*,"))ok=1;
    
    # 12.2BC
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)BC[0-9]*,"))ok=1;
    
    # 12.2CZ
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)CZ[0-9]*,"))ok=1;
    
    # 12.2JK
    if(egrep(string:os, pattern:"((12\.2\(([0-9]|1[0-4])\)|12\.2)JK[0-9]*|12\.2\(15\)JK[0-1]),"))ok=1;
    
    # 12.2T
    if(egrep(string:os, pattern:"((12\.2\(([0-9]|1[0-4])\)|12\.2)T[0-9]*|12\.2\(15\)T([0-9]|1[0-2])),"))ok=1;
    
    # 12.2XB
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XB[0-9]*,"))ok=1;
    
    # 12.2XG
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XG[0-9]*,"))ok=1;
    
    # 12.2XM
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XM[0-9]*,"))ok=1;
    
    # 12.2XT
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XT[0-9]*,"))ok=1;
    
    # 12.2XU
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XU[0-9]*,"))ok=1;
    
    # 12.2XW
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XW[0-9]*,"))ok=1;
    
    # 12.2XZ
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)XZ[0-9]*,"))ok=1;
    
    # 12.2YA
    if(egrep(string:os, pattern:"((12\.2\([0-3]\)|12\.2)YA[0-9]*|12\.2\(4\)YA[0-7]),"))ok=1;
    
    # 12.2YB
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YB[0-9]*,"))ok=1;
    
    # 12.2YC
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YC[0-9]*,"))ok=1;
    
    # 12.2YD
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YD[0-9]*,"))ok=1;
    
    # 12.2YF
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YF[0-9]*,"))ok=1;
    
    # 12.2YG
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YG[0-9]*,"))ok=1;
    
    # 12.2YH
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YH[0-9]*,"))ok=1;
    
    # 12.2YJ
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YJ[0-9]*,"))ok=1;
    
    # 12.2YL
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YL[0-9]*,"))ok=1;
    
    # 12.2YM
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YM[0-9]*,"))ok=1;
    
    # 12.2YN
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YN[0-9]*,"))ok=1;
    
    # 12.2YQ
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YQ[0-9]*,"))ok=1;
    
    # 12.2YR
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YR[0-9]*,"))ok=1;
    
    # 12.2YS
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)YS[0-9]*,"))ok=1;
    
    # 12.2ZK
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)ZK[0-9]*,"))ok=1;
    
    # 12.2ZO
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)ZO[0-9]*,"))ok=1;
    
    # 12.2ZP
    if(egrep(string:os, pattern:"(12\.2\([0-9]*\)|12\.2)ZP[0-9]*,"))ok=1;
    
    # 12.3
    if(egrep(string:os, pattern:"(12\.3\([0-8]\)|12\.3),"))ok=1;
    
    # 12.3T
    if(egrep(string:os, pattern:"((12\.3\([0-1]\)|12\.3)T[0-9]*|12\.3\(2\)T[0-6]),"))ok=1;
    
    # 12.3XA
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XA[0-9]*,"))ok=1;
    
    # 12.3XB
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XB[0-9]*,"))ok=1;
    
    # 12.3XC
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XC[0-9]*,"))ok=1;
    
    # 12.3XD
    if(egrep(string:os, pattern:"((12\.3\([0-3]\)|12\.3)XD[0-9]*|12\.3\(4\)XD[0-2]),"))ok=1;
    
    # 12.3XE
    if(egrep(string:os, pattern:"((12\.3\([0-1]\)|12\.3)XE[0-9]*|12\.3\(2\)XE[0-0]),"))ok=1;
    
    # 12.3XF
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XF[0-9]*,"))ok=1;
    
    # 12.3XG
    if(egrep(string:os, pattern:"((12\.3\([0-3]\)|12\.3)XG[0-9]*|12\.3\(4\)XG[0-1]),"))ok=1;
    
    # 12.3XH
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XH[0-9]*,"))ok=1;
    
    # 12.3XI
    if(egrep(string:os, pattern:"(12\.3\([0-6]\)|12\.3)XI[0-9]*,"))ok=1;
    
    # 12.3XJ
    if(egrep(string:os, pattern:"((12\.3\([0-6]\)|12\.3)XJ[0-9]*|12\.3\(7\)XJ[0-1]),"))ok=1;
    
    # 12.3XK
    if(egrep(string:os, pattern:"((12\.3\([0-3]\)|12\.3)XK[0-9]*|12\.3\(4\)XK[0-0]),"))ok=1;
    
    # 12.3XL
    if(egrep(string:os, pattern:"(12\.3\([0-6]\)|12\.3)XL[0-9]*,"))ok=1;
    
    # 12.3XN
    if(egrep(string:os, pattern:"(12\.3\([0-9]*\)|12\.3)XN[0-9]*,"))ok=1;
    
    # 12.3XQ
    if(egrep(string:os, pattern:"((12\.3\([0-3]\)|12\.3)XQ[0-9]*|12\.3\(4\)XQ[0-0]),"))ok=1;
    
    
    #----------------------------------------------
    
    if(ok)security_warning(port:161, proto:"udp");
    

Oval

accepted2010-05-31T04:00:06.154-04:00
classvulnerability
contributors
  • nameYuzheng Zhou
    organizationHewlett-Packard
  • nameRonald Jones
    organizationDTCC
  • nameRonald Jones
    organizationDTCC
descriptionCisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port.
familyios
idoval:org.mitre.oval:def:4849
statusaccepted
submitted2008-05-26T11:06:36.000-04:00
titleCisco Systems IOS Skinny Call Control Protocol Handler Denial of Service Vulnerability
version5