First published: Wed Dec 31 2003(Updated: )
The Session Initiation Protocol (SIP) implementation in Alcatel OmniPCX Enterprise 5.0 Lx allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel-Lucent OmniPCX | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1108 is considered a high severity vulnerability that can lead to denial of service and potential code execution.
To fix CVE-2003-1108, update the Alcatel OmniPCX Enterprise software to a version that has addressed this vulnerability.
CVE-2003-1108 affects users of Alcatel OmniPCX Enterprise version 5.0 on Linux systems.
CVE-2003-1108 enables remote attackers to launch denial of service attacks or potentially execute arbitrary code.
CVE-2003-1108 involves the Session Initiation Protocol (SIP) implementation in Alcatel OmniPCX Enterprise.