Advisory Published
Updated

CVE-2010-0581

First published: Thu Mar 25 2010(Updated: )

Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz89904, the "SIP Packet Parsing Arbitrary Code Execution Vulnerability."

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS=12.3ym
Cisco IOS=12.3yq
Cisco IOS=12.3xr
Cisco IOS=12.4t
Cisco IOS=12.3xg
Cisco IOS=12.3xd
Cisco IOS=12.3xw
Cisco IOS=12.4mr
Cisco IOS=12.4xt
Cisco IOS=12.3xi
Cisco IOS=12.4gc
Cisco IOS=12.3yu
Cisco IOS=12.3xj
Cisco IOS=12.3t
Cisco IOS=12.3xz
Cisco IOS=12.4ya
Cisco IOS=12.3xf
Cisco IOS=12.3xl
Cisco IOS=12.3yk
Cisco IOS=12.3yf
Cisco IOS=12.4xd
Cisco IOS=12.4xp
Cisco IOS=12.4yd
Cisco IOS=12.3yt
Cisco IOS=12.4mda
Cisco IOS=12.3yz
Cisco IOS=12.3yg
Cisco IOS=12.3xu
Cisco IOS=12.3xy
Cisco IOS=12.4yg
Cisco IOS=12.4
Cisco IOS=12.4xa
Cisco IOS=12.3za
Cisco IOS=12.3yx
Cisco IOS=12.3xq
Cisco IOS=12.4md
Cisco IOS=12.3ys
Cisco IOS=12.3jk
Cisco IOS=12.4yb
Cisco IOS=12.4xb
Cisco IOS=12.3xx
Cisco IOS=12.4xr
Cisco IOS=12.4ye
Cisco IOS=12.3xk

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203