by Cynthia Kuo

Cisco Security update

analysis
Feb 5, 20071 min

After last week's release of three security advisories, Cisco has again released another security advisory for the SIP protocol. Apparently Cisco IOS devices which supports voice that are not configured for SIP processing will reload if a packet to port 5060 is received. Cisco doesn't know the exact conditions of the flaw but has released an advisory with a work around and patched IOS to fix the problem. If you

After last week’s release of three security advisories, Cisco has again released another security advisory for the SIP protocol. Apparently Cisco IOS devices which supports voice that are not configured for SIP processing will reload if a packet to port 5060 is received. Cisco doesn’t know the exact conditions of the flaw but has released an advisory with a work around and patched IOS to fix the problem. If you are wondering, “Is my device vulnerable?”, please see the official Cisco advisory. You may not know this, but most Cisco routers have voice capabilities. The SIP functionality is in most basic IOS images. . The last thing you need is a DDoS attack against your main router. The SIP protocol is the defacto standard for VoIP solutions and it could be a simple mis-configuration of a SIP endpoint trying to register to your router that causes it to reload. Security first.

John Jones

q!Bang Solutions, Inc.