Condorlab

CISCO – BuffOverflow – DoS


Advisory IDRSN-SIP-1561


Vulnerability Information
A vulnerability in the Session Initiation Protocol (SIP) of the CiscoTelePresence Codec (TC) and Collaboration Endpoint (CE) Software couldallow an unauthenticated, remote attacker to cause a TelePresenceendpoint to reload unexpectedly, resulting in a denial of service (DoS)condition. The vulnerability is due to a lack of flow-controlmechanisms within the software. An attacker could exploit thisvulnerability by sending a flood of SIP INVITE packets to the affecteddevice. An exploit could allow the attacker to impact the availabilityof services and data of the device, including a complete DoS condition.This vulnerability affects the following Cisco TC and CE platforms whenrunning software versions prior to TC 7.3.8 and CE 8.3.0. Cisco BugIDs: CSCux94002.


Release Date
2017-06-08 00:00:00


Solutions
RedShift Networks UCTM solution provides the industry’s first complete security solution developed for securing VOIP networks, endpoints and applications. Its dedicated CONDOR labs research team constantly scouts for new attack patterns, advanced penetration testing methods, vulnerabilities identification and roll out of new signatures to subscribed customers on a constant basis. For more information, visit www.redshiftnetworks.com


External Resources
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6648