Lucene search

K
nessusThis script is (C) 2010-2018 Tenable Network Security, Inc.CISCO-SA-20030221-PROTOSHTTP.NASL
HistorySep 01, 2010 - 12:00 a.m.

Multiple Product Vulnerabilities Found by PROTOS SIP Test Suite - Cisco Systems

2010-09-0100:00:00
This script is (C) 2010-2018 Tenable Network Security, Inc.
www.tenable.com
6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.044 Low

EPSS

Percentile

92.4%

Multiple Cisco products contain vulnerabilities in the processing of Session Initiation Protocol (SIP) INVITE messages. These vulnerabilities were identified by the University of Oulu Secure Programming Group (OUSPG) “PROTOS” Test Suite for SIP and can be repeatedly exploited to produce a denial of service.

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
# Security advisory is (C) CISCO, Inc.
# See https://www.cisco.com/en/US/products/products_security_advisory09186a008014a251.shtml

if (NASL_LEVEL < 3000) exit(0);

include("compat.inc");

if (description)
{
 script_id(48969);
 script_version("1.17");
 script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");
 script_cve_id("CVE-2003-1109");
 script_bugtraq_id(6904);
 script_xref(name:"CERT-CC", value:"528719");
 script_xref(name:"CERT-CC", value:"CA-2003-06");
 script_name(english:"Multiple Product Vulnerabilities Found by PROTOS SIP Test Suite - Cisco Systems");
 script_summary(english:"Checks the IOS version.");
 script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch");
 script_set_attribute(attribute:"description", value:
' Multiple Cisco products contain vulnerabilities in the processing of
Session Initiation Protocol (SIP) INVITE messages. These
vulnerabilities were identified by the University of Oulu Secure
Programming Group (OUSPG) "PROTOS" Test Suite for SIP and can be
repeatedly exploited to produce a denial of service.
');
 script_set_attribute(attribute:"see_also", value:"https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip");
 # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20030221-protos
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?5753c28d");
 # https://www.cisco.com/en/US/products/products_security_advisory09186a008014a251.shtml
 script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?f555e750");
 script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20030221-protos.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");

 script_set_attribute(attribute:"vuln_publication_date", value:"2003/02/21");
 script_set_attribute(attribute:"patch_publication_date", value:"2003/02/21");
 script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01");

 script_end_attributes();
 script_xref(name:"CISCO-BUG-ID", value:"CSCdx47789");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz26317");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz29003");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz29033");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz29041");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz39284");
 script_xref(name:"CISCO-BUG-ID", value:"CSCdz41124");
 script_xref(name:"CISCO-SA", value:"cisco-sa-20030221-protos");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc.");
 script_family(english:"CISCO");
 script_dependencie("cisco_ios_version.nasl");
 script_require_keys("Host/Cisco/IOS/Version");
 exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
report_extra = "";
version = get_kb_item_or_exit("Host/Cisco/IOS/Version");
override = 0;

# Affected: 12.2 T
if (check_release(version: version,
                  patched: make_list("12.2(11)T3", "12.2(13)T1") )) {
 report_extra = '\nUpdate to ' + patch_update + ' or later\n'; flag++;
}

if (get_kb_item("Host/local_checks_enabled"))
{
  if (flag)
  {
    flag = 0;
    buf = cisco_command_kb_item("Host/Cisco/Config/show_processes", "show processes");
    if (check_cisco_result(buf))
    {
      if (preg(pattern:"SIP", multiline:TRUE, string:buf)) { flag = 1; }
    } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
  }
}


if (flag)
{
  security_hole(port:0, extra:report_extra + cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

VendorProductVersionCPE
ciscoioscpe:/o:cisco:ios

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.044 Low

EPSS

Percentile

92.4%

Related for CISCO-SA-20030221-PROTOSHTTP.NASL