First published: Thu Feb 01 2007(Updated: )
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.4\(2\)t2 | |
Cisco IOS | =12.3ym | |
Cisco IOS | =12.3yq | |
Cisco IOS | =12.4t | |
Cisco IOS | =12.3\(14\)t5 | |
Cisco IOS | =12.4\(2\)t4 | |
Cisco IOS | =12.4\(6\)t | |
Cisco IOS | =12.4\(5\) | |
Cisco IOS | =12.4\(5b\) | |
Cisco IOS | =12.4xj | |
Cisco IOS | =12.4\(2\)mr | |
Cisco IOS | =12.4\(3b\) | |
Cisco IOS | =12.3\(14\)t2 | |
Cisco IOS | =12.4\(4\)mr | |
Cisco IOS | =12.4mr | |
Cisco IOS | =12.4xt | |
Cisco IOS | =12.4\(4\)t | |
Cisco IOS | =12.4\(3\)t2 | |
Cisco IOS | =12.3yu | |
Cisco IOS | =12.4\(2\)t1 | |
Cisco IOS | =12.3\(14\)t4 | |
Cisco IOS | =12.4\(1\) | |
Cisco IOS | =12.3\(14\)t | |
Cisco IOS | =12.4\(2\)mr1 | |
Cisco IOS | =12.4\(2\)t3 | |
Cisco IOS | =12.4xg | |
Cisco IOS | =12.4\(2\)xb | |
Cisco IOS | =12.4\(1c\) | |
Cisco IOS | =12.4\(1b\) | |
Cisco IOS | =12.4\(3a\) | |
Cisco IOS | =12.4\(4\)t2 | |
Cisco IOS | =12.3yk | |
Cisco IOS | =12.4\(2\)xb2 | |
Cisco IOS | =12.4xd | |
Cisco IOS | =12.4xp | |
Cisco IOS | =12.4\(2\)t | |
Cisco IOS | =12.4\(7\) | |
Cisco IOS | =12.4\(3d\) | |
Cisco IOS | =12.3yt | |
Cisco IOS | =12.4\(6\)t1 | |
Cisco IOS | =12.3yg | |
Cisco IOS | =12.4 | |
Cisco IOS | =12.4\(8\) | |
Cisco IOS | =12.4\(9\)t | |
Cisco IOS | =12.4sw | |
Cisco IOS | =12.4xa | |
Cisco IOS | =12.4\(7a\) | |
Cisco IOS | =12.4xe | |
Cisco IOS | =12.3yx | |
Cisco IOS | =12.4\(2\)xa | |
Cisco IOS | =12.4xb | |
Cisco IOS | =12.4\(3\) | |
Cisco IOS | =12.4xc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.