FKIE_CVE-2010-0581
Vulnerability from fkie_nvd - Published: 2010-03-25 21:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz89904, the "SIP Packet Parsing Arbitrary Code Execution Vulnerability."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.3jk | |
| cisco | ios | 12.3t | |
| cisco | ios | 12.3xd | |
| cisco | ios | 12.3xf | |
| cisco | ios | 12.3xg | |
| cisco | ios | 12.3xi | |
| cisco | ios | 12.3xj | |
| cisco | ios | 12.3xk | |
| cisco | ios | 12.3xl | |
| cisco | ios | 12.3xq | |
| cisco | ios | 12.3xr | |
| cisco | ios | 12.3xu | |
| cisco | ios | 12.3xw | |
| cisco | ios | 12.3xx | |
| cisco | ios | 12.3xy | |
| cisco | ios | 12.3xz | |
| cisco | ios | 12.3yf | |
| cisco | ios | 12.3yg | |
| cisco | ios | 12.3yk | |
| cisco | ios | 12.3ym | |
| cisco | ios | 12.3yq | |
| cisco | ios | 12.3ys | |
| cisco | ios | 12.3yt | |
| cisco | ios | 12.3yu | |
| cisco | ios | 12.3yx | |
| cisco | ios | 12.3yz | |
| cisco | ios | 12.3za | |
| cisco | ios | 12.4 | |
| cisco | ios | 12.4gc | |
| cisco | ios | 12.4md | |
| cisco | ios | 12.4mda | |
| cisco | ios | 12.4mr | |
| cisco | ios | 12.4t | |
| cisco | ios | 12.4xa | |
| cisco | ios | 12.4xb | |
| cisco | ios | 12.4xd | |
| cisco | ios | 12.4xp | |
| cisco | ios | 12.4xr | |
| cisco | ios | 12.4xt | |
| cisco | ios | 12.4ya | |
| cisco | ios | 12.4yb | |
| cisco | ios | 12.4yd | |
| cisco | ios | 12.4ye | |
| cisco | ios | 12.4yg |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
"matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
"matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
"matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
"matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
"matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
"matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
"matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*",
"matchCriteriaId": "89B19F2B-1D89-42FC-89A7-737D8109EB1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*",
"matchCriteriaId": "237F6EDD-AB47-4768-9C75-C0B03E23696B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC90BE87-EB54-46F8-A1FD-8F4E553C69F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
"matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*",
"matchCriteriaId": "E67621EA-25D8-47C2-ADEA-512E38F2FFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*",
"matchCriteriaId": "94E1421B-2B86-41B2-9288-59780E081337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*",
"matchCriteriaId": "51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*",
"matchCriteriaId": "6D910556-9518-45C5-9891-1541760B0920",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the SIP implementation in Cisco IOS 12.3 and 12.4 allows remote attackers to execute arbitrary code via a malformed SIP message, aka Bug ID CSCsz89904, the \"SIP Packet Parsing Arbitrary Code Execution Vulnerability.\""
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en la implementaci\u00f3n SIP en Cisco IOS v12.3 y v12.4, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un mensaje SIP mal formado. Tambi\u00e9n conocido como Bug ID CSCsz89904."
}
],
"id": "CVE-2010-0581",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-03-25T21:00:00.827",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/39068"
},
{
"source": "psirt@cisco.com",
"url": "http://securitytracker.com/id?1023744"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20065"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/39068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1023744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=20065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20f32.shtml"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…