First published: Wed Dec 31 2003(Updated: )
The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(1\)xa | |
Cisco IOS | =12.2\(1\)xd | |
Cisco IOS | =12.2\(1\)xd1 | |
Cisco IOS | =12.2\(1\)xd3 | |
Cisco IOS | =12.2\(1\)xd4 | |
Cisco IOS | =12.2\(1\)xe | |
Cisco IOS | =12.2\(1\)xe2 | |
Cisco IOS | =12.2\(1\)xe3 | |
Cisco IOS | =12.2\(1\)xh | |
Cisco IOS | =12.2\(1\)xq | |
Cisco IOS | =12.2\(1\)xs | |
Cisco IOS | =12.2\(1\)xs1 | |
Cisco IOS | =12.2\(2\)t4 | |
Cisco IOS | =12.2\(2\)xa | |
Cisco IOS | =12.2\(2\)xa1 | |
Cisco IOS | =12.2\(2\)xa5 | |
Cisco IOS | =12.2\(2\)xb | |
Cisco IOS | =12.2\(2\)xb3 | |
Cisco IOS | =12.2\(2\)xb4 | |
Cisco IOS | =12.2\(2\)xf | |
Cisco IOS | =12.2\(2\)xg | |
Cisco IOS | =12.2\(2\)xh | |
Cisco IOS | =12.2\(2\)xh2 | |
Cisco IOS | =12.2\(2\)xh3 | |
Cisco IOS | =12.2\(2\)xi | |
Cisco IOS | =12.2\(2\)xi1 | |
Cisco IOS | =12.2\(2\)xi2 | |
Cisco IOS | =12.2\(2\)xj | |
Cisco IOS | =12.2\(2\)xj1 | |
Cisco IOS | =12.2\(2\)xk | |
Cisco IOS | =12.2\(2\)xk2 | |
Cisco IOS | =12.2\(2\)xn | |
Cisco IOS | =12.2\(2\)xt | |
Cisco IOS | =12.2\(2\)xt3 | |
Cisco IOS | =12.2\(2\)xu | |
Cisco IOS | =12.2\(2\)xu2 | |
Cisco IOS | =12.2\(11\)t | |
Cisco IOS | =12.2t | |
Cisco IOS | =12.2xa | |
Cisco IOS | =12.2xb | |
Cisco IOS | =12.2xc | |
Cisco IOS | =12.2xd | |
Cisco IOS | =12.2xe | |
Cisco IOS | =12.2xf | |
Cisco IOS | =12.2xg | |
Cisco IOS | =12.2xh | |
Cisco IOS | =12.2xi | |
Cisco IOS | =12.2xj | |
Cisco IOS | =12.2xk | |
Cisco IOS | =12.2xl | |
Cisco IOS | =12.2xm | |
Cisco IOS | =12.2xn | |
Cisco IOS | =12.2xq | |
Cisco IOS | =12.2xr | |
Cisco IOS | =12.2xs | |
Cisco IOS | =12.2xt | |
Cisco IOS | =12.2xw | |
Cisco VoIP Phone CP-7940 | ||
Cisco VoIP Phone CP-7960 | ||
Cisco PIX Firewall | =5.2\(1\) | |
Cisco PIX Firewall | =5.2\(2\) | |
Cisco PIX Firewall | =5.2\(3.210\) | |
Cisco PIX Firewall | =5.2\(5\) | |
Cisco PIX Firewall | =5.2\(6\) | |
Cisco PIX Firewall | =5.2\(7\) | |
Cisco PIX Firewall | =5.3 | |
Cisco PIX Firewall | =5.3\(1\) | |
Cisco PIX Firewall | =5.3\(1.200\) | |
Cisco PIX Firewall | =5.3\(2\) | |
Cisco PIX Firewall | =5.3\(3\) | |
Cisco PIX Firewall | =6.0 | |
Cisco PIX Firewall | =6.0\(1\) | |
Cisco PIX Firewall | =6.0\(2\) | |
Cisco PIX Firewall | =6.1\(2\) | |
Cisco PIX Firewall | =6.2\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2003-1109 is critical due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2003-1109, update the affected Cisco products to the latest available software versions provided by Cisco.
CVE-2003-1109 affects multiple Cisco products including IP Phone models 7940 and 7960, various versions of Cisco IOS, and Secure PIX Firewall versions.
CVE-2003-1109 can be exploited by sending crafted INVITE messages which may lead to a denial of service or arbitrary code execution.
Yes, Cisco has released patches for CVE-2003-1109; affected users should apply these updates immediately.