Vulnerabilities > CVE-2009-2867 - Unspecified vulnerability in Cisco IOS

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
cisco
nessus

Summary

Unspecified vulnerability in Cisco IOS 12.2XNA, 12.2XNB, 12.2XNC, 12.2XND, 12.4T, 12.4XZ, and 12.4YA, when Zone-Based Policy Firewall SIP Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted SIP transit packet, aka Bug ID CSCsr18691.

Nessus

NASL familyCISCO
NASL idCISCO-SA-20090923-IOS-FWHTTP.NASL
descriptionCisco IOS devices that are configured with Cisco IOS Zone-Based Policy Firewall Session Initiation Protocol (SIP) inspection are vulnerable to denial of service (DoS) attacks when processing a specific SIP transit packet. Exploitation of the vulnerability could result in a reload of the affected device. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
last seen2019-10-28
modified2010-09-01
plugin id49043
published2010-09-01
reporterThis script is (C) 2010-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/49043
titleCisco IOS Software Zone-Based Policy Firewall Vulnerability - Cisco Systems

Oval

accepted2013-04-22T04:00:15.726-04:00
classvulnerability
contributors
  • nameKASHIF LATIF
    organizationDTCC
  • nameShane Shaffer
    organizationG2, Inc.
descriptionUnspecified vulnerability in Cisco IOS 12.2XNA, 12.2XNB, 12.2XNC, 12.2XND, 12.4T, 12.4XZ, and 12.4YA, when Zone-Based Policy Firewall SIP Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted SIP transit packet, aka Bug ID CSCsr18691.
familyios
idoval:org.mitre.oval:def:7254
statusaccepted
submitted2010-05-13T12:00:00.000-04:00
titleCisco IOS zone based sip inspection vulnerability
version9