ID CVE-2004-0054
Summary Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T through 12.2T allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
References
Vulnerable Configurations
  • Cisco IOS 11.3T
    cpe:2.3:o:cisco:ios:11.3t
  • Cisco IOS 12.0
    cpe:2.3:o:cisco:ios:12.0
  • Cisco IOS 12.0S
    cpe:2.3:o:cisco:ios:12.0s
  • Cisco IOS 12.0T
    cpe:2.3:o:cisco:ios:12.0t
  • Cisco IOS 12.1
    cpe:2.3:o:cisco:ios:12.1
  • Cisco IOS 12.1E
    cpe:2.3:o:cisco:ios:12.1e
  • Cisco IOS 12.1T
    cpe:2.3:o:cisco:ios:12.1t
  • Cisco IOS 12.2
    cpe:2.3:o:cisco:ios:12.2
  • Cisco IOS 12.2S
    cpe:2.3:o:cisco:ios:12.2s
  • Cisco IOS 12.2T
    cpe:2.3:o:cisco:ios:12.2t
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-448.NASL
    description Multiple vulnerabilities were discovered in pwlib, a library used to aid in writing portable applications, whereby a remote attacker could cause a denial of service or potentially execute arbitrary code. This library is most notably used in several applications implementing the H.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 15285
    published 2004-09-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15285
    title Debian DSA-448-1 : pwlib - several vulnerabilities
  • NASL family CISCO
    NASL id CISCO_H323_DOS.NASL
    description According to its version number, the remote host is running a vulnerable version of Cisco IOS. The affected versions have multiple buffer overflow vulnerabilities in the H.323 processing routines. H.323 is a standard that defines several protocols used for audio/visual applications, including IP telephony. A remote attacker could use this to cause a denial of service, or potentially execute arbitrary code.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 12023
    published 2004-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=12023
    title Cisco IOS H.323 Protocol Implementation Flaws
  • NASL family CISCO
    NASL id CISCO-SA-20040113-H323HTTP.NASL
    description Multiple Cisco products contain vulnerabilities in the processing of H.323 messages, which are typically used in Voice over Internet Protocol (VoIP) or multimedia applications. A test suite has been developed by the University of Oulu to target this protocol and identify vulnerabilities. Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T. Release 11.3T, and all later Cisco IOS releases may be affected if the software includes support for voice/multimedia applications. Vulnerable devices include those that contain software support for H.323 as network elements as well as those configured for IOS Network Address Translation (NAT) and those configured for IOS Firewall (also known as Context-Based Access Control [CBAC]). Other Cisco voice products that do not run Cisco IOS may also be affected. These vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 48972
    published 2010-09-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=48972
    title Vulnerabilities in H.323 Message Processing - Cisco Systems
oval via4
accepted 2008-09-08T04:00:12.094-04:00
class vulnerability
contributors
name Yuzheng Zhou
organization Hewlett-Packard
description Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T through 12.2T allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
family ios
id oval:org.mitre.oval:def:4884
status accepted
submitted 2008-05-26T11:06:36.000-04:00
title Cisco H.323 Protocol Denial of Service Vulnerability
version 3
refmap via4
bid 9406
cert CA-2004-01
cert-vn VU#749342
cisco 20040113 Vulnerabilities in H.323 Message Processing
misc http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
sectrack 1008685
Last major update 04-03-2009 - 00:21
Published 17-02-2004 - 00:00
Last modified 10-10-2017 - 21:29
Back to Top