{"vuid":"VU#430969","idnumber":"430969","name":"Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages","keywords":["Cisco","Firewall Services Module","FWSM","DoS. denial of service","SIP messages"],"overview":"Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial-of-service condition.","clean_desc":"The Cisco Firewall Services Module is an integrated firewall service for Cisco Catalyst 6500 series switches and Cisco 7600 series routers. This module fails to properly inspect SIP messages which may cause the system to crash. This vulnerability can be exploited when an attacker sends a specially crafted SIP message to the system. Cisco states that SIP inspection is enabled by default in 2.x versions of the module.","impact":"A remote, unauthenticated attacker may be able to cause the system to crash.","resolution":"Upgrade Cisco states this issue has been addressed in  2.3(4.12) for the 2.3.x series, and 3.1(3.24) for the 3.x series. Please see Cisco Security Advisory cisco-sa-20070214-fwsm for further information.","workarounds":"Workaround Disable deep packet inspection. Please see Cisco Security Advisory cisco-sa-20070214-fwsm for further information.","sysaffected":"","thanks":"Thanks to Cisco Systems Product Security Incident Response Team for reporting this vulnerability.","author":"This document was written by Katie Steiner.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml","http://securitytracker.com/alerts/2007/Feb/1017650.html"],"cveids":["CVE-2007-0961"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-14T19:33:44Z","publicdate":"2007-02-14T00:00:00Z","datefirstpublished":"2007-02-16T21:21:59Z","dateupdated":"2007-02-22T14:15:27Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"12.6","cam_scorecurrentwidelyknown":"14.4","cam_scorecurrentwidelyknownexploited":"21.6","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.6,"vulnote":null}