fkie_cve-2007-0648
Vulnerability from fkie_nvd
Published
2007-02-01 01:28
Modified
2025-04-09 00:30
Severity ?
Summary
Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.3\(14\)t | |
| cisco | ios | 12.3\(14\)t2 | |
| cisco | ios | 12.3\(14\)t4 | |
| cisco | ios | 12.3\(14\)t5 | |
| cisco | ios | 12.3yg | |
| cisco | ios | 12.3yk | |
| cisco | ios | 12.3ym | |
| cisco | ios | 12.3yq | |
| cisco | ios | 12.3yt | |
| cisco | ios | 12.3yu | |
| cisco | ios | 12.3yx | |
| cisco | ios | 12.4 | |
| cisco | ios | 12.4\(1\) | |
| cisco | ios | 12.4\(1b\) | |
| cisco | ios | 12.4\(1c\) | |
| cisco | ios | 12.4\(2\)mr | |
| cisco | ios | 12.4\(2\)mr1 | |
| cisco | ios | 12.4\(2\)t | |
| cisco | ios | 12.4\(2\)t1 | |
| cisco | ios | 12.4\(2\)t2 | |
| cisco | ios | 12.4\(2\)t3 | |
| cisco | ios | 12.4\(2\)t4 | |
| cisco | ios | 12.4\(2\)xa | |
| cisco | ios | 12.4\(2\)xb | |
| cisco | ios | 12.4\(2\)xb2 | |
| cisco | ios | 12.4\(3\) | |
| cisco | ios | 12.4\(3\)t2 | |
| cisco | ios | 12.4\(3a\) | |
| cisco | ios | 12.4\(3b\) | |
| cisco | ios | 12.4\(3d\) | |
| cisco | ios | 12.4\(4\)mr | |
| cisco | ios | 12.4\(4\)t | |
| cisco | ios | 12.4\(4\)t2 | |
| cisco | ios | 12.4\(5\) | |
| cisco | ios | 12.4\(5b\) | |
| cisco | ios | 12.4\(6\)t | |
| cisco | ios | 12.4\(6\)t1 | |
| cisco | ios | 12.4\(7\) | |
| cisco | ios | 12.4\(7a\) | |
| cisco | ios | 12.4\(8\) | |
| cisco | ios | 12.4\(9\)t | |
| cisco | ios | 12.4mr | |
| cisco | ios | 12.4sw | |
| cisco | ios | 12.4t | |
| cisco | ios | 12.4xa | |
| cisco | ios | 12.4xb | |
| cisco | ios | 12.4xc | |
| cisco | ios | 12.4xd | |
| cisco | ios | 12.4xe | |
| cisco | ios | 12.4xg | |
| cisco | ios | 12.4xj | |
| cisco | ios | 12.4xp | |
| cisco | ios | 12.4xt |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "D32302AE-54E2-423A-A418-6C7EAE2CDF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F616AE0-42B4-403B-B610-99DE15EE490D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*",
"matchCriteriaId": "68A83281-667D-4D1A-9F76-CFF3E5AD560F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "65B65738-134F-4C1A-916B-D6CD6365CB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5331586-8380-4F77-8735-17EC0D0E503A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*",
"matchCriteriaId": "35536E91-A58D-40F7-A256-34128E64B920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "0F69329B-4D37-428E-B467-E3B9314A4D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "9615B275-5748-46CC-8A77-4A9550A39050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "421CD923-6282-4404-A642-C04E1F57F12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4411CB-5EE9-455C-AE90-1770320EFD86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "593D1680-4883-43FE-A925-B87ED1D2E785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*",
"matchCriteriaId": "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*",
"matchCriteriaId": "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*",
"matchCriteriaId": "90769378-BBD1-48D0-921C-A79413B99CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E0D6801-E9A8-416B-830B-7682A9AF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23265E4D-855C-4CCC-A875-DFCBA55B3CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB86291-EB40-4CFD-A424-898EFB3D518B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A10AADAC-4687-4308-8E4F-B7F9549556DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A747987-5218-4C1E-87C4-0675CD4F7A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B6483CB-7838-45F7-AE28-824AD71172A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04759B1E-8B40-460F-B33F-4E6332CFC31D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "08AF3694-9686-444B-8D92-E41D262F74E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5595E7D-3CFD-4FF2-A6BE-59645058C54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4235428-5E2E-4BCB-98B7-8844B19C7AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9A1E17AB-F645-4636-9337-3158556E85A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86150D11-94D7-43F9-9D19-33778558255F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC43701-8A3A-42FB-B4F5-566DE59E542E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS after 12.3(14)T, 12.3(8)YC1, 12.3(8)YG, and 12.4, with voice support and without Session Initiated Protocol (SIP) configured, allows remote attackers to cause a denial of service (crash) by sending a crafted packet to port 5060/UDP."
},
{
"lang": "es",
"value": "Cisco IOS despu\u00e9s de las versiones 12.3(14)T, 12.3(8)YC1, 12.3(8)YG y 12.4, con soporte de voz y sin el Session Initiated Protocol (SIP) configurado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante el env\u00edo de un paquete manipulado al puerto 5060/UDP."
}
],
"id": "CVE-2007-0648",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-01T01:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23978"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1017575"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/438176"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22330"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0428"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017575"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-air-20070131-sip.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/438176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22330"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5138"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…