First published: Mon Oct 03 2011(Updated: )
Memory leak in Cisco IOS 12.4, 15.0, and 15.1, Cisco IOS XE 2.5.x through 3.2.x, and Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su4, 8.x before 8.5(1)su2, and 8.6 before 8.6(1) allows remote attackers to cause a denial of service (memory consumption and device reload or process failure) via a malformed SIP message, aka Bug IDs CSCtl86047 and CSCto88686.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1 | |
Cisco IOS | =15.0 | |
Cisco IOS | =12.4 | |
Cisco IOS XE | =2.5.0 | |
Cisco IOS XE | =2.6.1 | |
Cisco IOS XE | =3.2.0s | |
Cisco IOS XE | =2.5.1 | |
Cisco IOS XE | =2.6.2 | |
Cisco IOS XE | =2.6.0 | |
Cisco IOS XE | =3.2.1s | |
Cisco IOS XE | =3.1.2s | |
Cisco IOS XE | =3.1.1s | |
Cisco IOS XE | =3.2.2s | |
Cisco IOS XE | =3.1.0s | |
Cisco IOS XE | =3.1.4s | |
Cisco IOS XE | =2.5.2 | |
Cisco IOS XE | =3.1.3s | |
Cisco Unified Communications Manager Session Management Edition | =8.5\(1\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2c\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =8.6 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(5\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\)su3 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(5\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(4a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(2a\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(1\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(1\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5a\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1b\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(3b\) | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\)su2 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(5\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5b\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\)su1a | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(5\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\) | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(2\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.0 | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(2c\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =6.1\(1a\) | |
Cisco Unified Communications Manager Session Management Edition | =8.5\(1\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.0\(2\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(1\) | |
Cisco Unified Communications Manager Session Management Edition | =8.0\(3a\)su1 | |
Cisco Unified Communications Manager Session Management Edition | =7.1\(3b\)su2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-2072 is high, as it can lead to a denial of service through memory consumption.
To fix CVE-2011-2072, upgrade to the latest patched version of the affected Cisco IOS or Unified Communications Manager software.
CVE-2011-2072 affects Cisco IOS versions 12.4, 15.0, and 15.1.
CVE-2011-2072 impacts Cisco Unified Communications Manager versions 6.x, 7.x before 7.1(5b)su4, and 8.x before 8.5(1)su2.
Yes, CVE-2011-2072 can be exploited remotely by an attacker to cause a denial of service.