First published: Wed Feb 06 2019(Updated: )
A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meeting Server Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190206-meeting-sipdos is classified as high due to the potential for denial of service conditions.
To fix cisco-sa-20190206-meeting-sipdos, upgrade to a version of Cisco Meeting Server that is not affected by the vulnerability.
Cisco Meeting Server installations that handle SIP call processing are affected by cisco-sa-20190206-meeting-sipdos.
cisco-sa-20190206-meeting-sipdos allows an unauthenticated remote attacker to cause a denial of service.
The cisco-sa-20190206-meeting-sipdos vulnerability is caused by insufficient validation in the Session Initiation Protocol (SIP) call processing.