|
|
|
|
| |
Credit:
The original article can be found at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3276
|
| |
.Vulnerable Systems:
* Cisco IOS Software NAT for Session Initiation Protocol (SIP)
Crafted SIP packets on TCP port 5060 could cause unpredictable results, including the reload of the vulnerable device. Translation of SIP over TCP packets will be disabled by default with the fix for this vulnerability.
Vendor Status:
Cisco has issued an update to correct this vulnerability
Patch Availability:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-nat
CVE Information:
CVE-2011-3276
Disclosure Timeline:
2012-Feb-17 Updated information in Ciso IOS Software table for Cisco IOS 12.2SXH.
2011-Oct-21 Corrected back-end information regarding CSCtd10712. No change made in the Security Advisory itself.
2011-Sep-30 Updated information in fixed Cisco IOS Software table for releases 12.2MRB, 12.2SXH, 12.2SXI, 12.2SXJ, and 12.2SY.
2011-Sep-28 Initial public release.
|
|
|
|
|