First published: Fri Feb 16 2007(Updated: )
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =7.2 | |
Cisco PIX Firewall | =7.1 | |
Cisco ASA 5500 CSC-SSM | =7.0 | |
Cisco ASA 5500 CSC-SSM | =7.2 | |
Cisco ASA 5500 CSC-SSM | =6.3 | |
Cisco ASA 5500 CSC-SSM | =7.1 | |
Cisco PIX Firewall | =7.0 | |
Cisco PIX Firewall | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0961 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2007-0961, update to the latest software versions as recommended by Cisco.
CVE-2007-0961 affects Cisco PIX 500 and ASA 5500 Series devices running specified versions prior to their respective patches.
CVE-2007-0961 exploits the 'inspect sip' option, allowing attackers to use malformed SIP packets to reboot the device.
Yes, CVE-2007-0961 can be exploited remotely by attackers sending malformed SIP packets.