{"vuid":"VU#749342","idnumber":"749342","name":"Multiple vulnerabilities in H.323 implementations","keywords":["NISCC","UNIRAS","OULU","PROTOS","OUSPG#0107","H.323","H.225","ASN.1","h323hostcall"],"overview":"A number of vulnerabilities have been discovered in various implementations of the multimedia telephony protocols H.323 and H.225. Voice over Internet Protocol (VoIP) and video conferencing equpiment and software can use these protocols to interoperate over a variety of computer networks. The majority of the vulnerabilities discovered are limited to denial of service impacts; however, several may allow unauthorized code execution.","clean_desc":"The U.K. National Infrastructure Security Co-ordination Center (NISCC) has reported multiple vulnerabilities in different vendor implementations of the multimedia telephony protocols H.323 and H.225. H.323 and H.225 are international standard protocols, published by the International Telecommunications Union, used to facilitate communication among telephony and multimedia systems. An example of such a system includes VoIP or video-conferencing equipment and software deployed on a network or computer. Sending an exceptional ASN.1 element to a vulnerable telephony component that cannot handle it may cause the application or system behavior to become unpredictable. A test suite developed by NISCC has exposed vulnerabilities in a variety of H.323/H.225 implementations. While most of these vulnerabilities exist in ASN.1 parsing routines, some vulnerabilities may occur elsewhere. Due to the general lack of specific vulnerability information, this document covers multiple vulnerabilities in different H.323/H.225 implementations. Information about individual vendors is available in the Systems Affected section. The U.K. National Infrastructure Security Co-ordination Centre is tracking this vulnerability as NISCC/006489/H.323.","impact":"The impacts associated with these vulnerabilities include denial of service, and potential execution of arbitrary code.","resolution":"Patch or Upgrade Apply a patch or upgrade as appropriate. Information about specific vendors is available in the Systems Affected section of this document.","workarounds":"One potential workaround includes making sure ports 1720/tcp and 1720/udp are blocked on network perimeters.","sysaffected":"","thanks":"The CERT Coordination Center thanks the \nNISCC\n Vulnerability Management Team\n and the University of Oulu Security Programming Group \nOUSPG\n for coordinating the discovery and release of the technical details of this issue.","author":"This document was written Jeffrey S. Havrilla based on information from NISCC.","public":["http://www.uniras.gov.uk/vuls/2004/006489/h323.htm","http://www.itu.int/itudoc/itu-t/rec/h/h225-0.html","http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/h2250v4/index.html"],"cveids":["CVE-2003-0819"],"certadvisory":"CA-2004-01","uscerttechnicalalert":null,"datecreated":"2003-10-27T16:57:11Z","publicdate":"2003-01-13T00:00:00Z","datefirstpublished":"2004-01-13T14:01:09Z","dateupdated":"2009-07-29T18:55:15Z","revision":43,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"12","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"18","cam_scorecurrent":"13.66875","cam_scorecurrentwidelyknown":"27.3375","cam_scorecurrentwidelyknownexploited":"45.5625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.66875,"vulnote":null}