First published: Thu Aug 09 2007(Updated: )
Cisco IOS 12.0 through 12.4 allows remote attackers to cause a denial of service via (1) a malformed MGCP packet, which causes a device hang, aka CSCsf08998; a malformed H.323 packet, which causes a device crash, as identified by (2) CSCsi60004 with Proxy Unregistration and (3) CSCsg70474; and a malformed Real-time Transport Protocol (RTP) packet, which causes a device crash, as identified by (4) CSCse68138, related to VOIP RTP Lib, and (5) CSCse05642, related to I/O memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.3 | |
Cisco IOS | =12.1 | |
Cisco IOS | =12.4 | |
Cisco IOS | =12.2 | |
Cisco IOS | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4291 has been classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2007-4291, it is recommended to update Cisco IOS to a version that is not affected by this vulnerability.
Exploitation of CVE-2007-4291 can lead to device hangs or crashes when processing malformed MGCP or H.323 packets.
CVE-2007-4291 affects Cisco IOS versions 12.0 through 12.4.
Network administrators using affected versions of Cisco IOS should be particularly concerned about CVE-2007-4291 due to its impact on device stability.