First published: Tue May 03 2011(Updated: )
Unspecified vulnerability in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5)su2, 7.x before 7.1(5b)su2, 8.0 before 8.0(3), and 8.5 before 8.5(1) allows remote attackers to cause a denial of service (process failure) via a malformed SIP message, aka Bug ID CSCth39586.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | =6.1\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(5\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4a\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(5\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.0 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2b\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(1\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(1\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2c\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =8.5 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2c\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\)su1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1605 has a severity rating that indicates it can cause a denial of service via malformed SIP messages.
To mitigate CVE-2011-1605, it is recommended to upgrade Cisco Unified Communications Manager to a patched version beyond those affected.
CVE-2011-1605 allows remote attackers to trigger a denial of service by sending malformed SIP messages.
CVE-2011-1605 affects Cisco Unified Communications Manager versions 6.x before 6.1(5)su2, as well as several versions in the 7.x and 8.x series.
Yes, CVE-2011-1605 is exploitable remotely, allowing attackers to disrupt communication services.