Cisco IOS H.323 Protocol Implementation Flaws

high Nessus Plugin ID 12023

Synopsis

The remote network device has a buffer overflow vulnerability.

Description

According to its version number, the remote host is running a vulnerable version of Cisco IOS. The affected versions have multiple buffer overflow vulnerabilities in the H.323 processing routines.
H.323 is a standard that defines several protocols used for audio/visual applications, including IP telephony.

A remote attacker could use this to cause a denial of service, or potentially execute arbitrary code.

Solution

Upgrade to the latest version of IOS, or block all H.323 traffic.

See Also

http://www.nessus.org/u?3d2630fc

Plugin Details

Severity: High

ID: 12023

File Name: cisco_h323_dos.nasl

Version: 1.17

Type: local

Family: CISCO

Published: 1/19/2004

Updated: 3/27/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/community, SNMP/sysDesc, CISCO/model

Exploit Ease: No known exploits are available

Patch Publication Date: 1/13/2004

Vulnerability Publication Date: 1/13/2004

Reference Information

CVE: CVE-2004-0054

BID: 9406