Cisco Wednesday issued two separate security alerts concerning its unified communications products – the third UC-related alert of this year. One of the alerts issued this week concern flaws in Cisco’s Unified IP Phone models, specifically related to the company’s Skinny Call Control Protocol (SCCP, or “Skinny”) and Session Initiation Protocol (SIP), while the other relates to an SQL Injection attack that could affect Cisco’s Unified Communications Manager – formerly CallManager.
According to Cisco, a number of its IP phones contain multiple overflow and denial-of-service vulnerabilities. Certain phones running SCCP and/or SIP firmware are vulnerable (see the list at the Cisco advisory). SCCP- and SIP-based phones contain a buffer overflow vulnerability in the handling of DNS responses. A specially-crafted DNS response may be able to trigger a buffer overflow and execute arbitrary code on a vulnerable phone, says Cisco. The hole is fixed in SCCP firmware version 8.0(8) and SIP firmware version 8.8(0).
Cisco Wednesday issued two separate security alerts concerning its unified communications products – the third UC-related alert of this year. One of the alerts issued this week concern flaws in Cisco’s Unified IP Phone models, specifically related to the company’s Skinny Call Control Protocol (SCCP, or “Skinny”) and Session Initiation Protocol (SIP), while the other relates to an SQL Injection attack that could affect Cisco’s Unified Communications Manager – formerly CallManager.
According to Cisco, a number of its IP phones contain multiple overflow and denial-of-service vulnerabilities. Certain phones running SCCP and/or SIP firmware are vulnerable (see the list at the Cisco advisory). SCCP- and SIP-based phones contain a buffer overflow vulnerability in the handling of DNS responses. A specially-crafted DNS response may be able to trigger a buffer overflow and execute arbitrary code on a vulnerable phone, says Cisco. The hole is fixed in SCCP firmware version 8.0(8) and SIP firmware version 8.8(0).
Cisco outlined three vulnerablities that affect certain SCCP devices: a large Internet Control Message Protocol (ICMP) Echo Request DOS, which can cause a vulnerable device to reboot by sending a large ICMP echo request packet; an HTTP Server DOS problem that could cause certain phones to reboot by sending a specially crafted HTTP request to TCP port 80; and a Secure Shell (SSH) flaw in other Cisco phones that could cause the phones to reboot if an unauthenticated attacker sent a specially crafted packet to port 22.
There are also three vulnerabilities affecting Cisco’s SIP devices: a SIP Multipurpose Internet Mail Extensions (MIME) boundary overflow; a Telnet Server overflow, and a SIP Proxy Response overflow.
The company also warned that its Unified Communications Manager is vulnerable to an SQL Injection attack in the parameter key of the admin and user interface pages. A successful attack could allow an authenticated attacker to access information such as usernames and password hashes that are stored in the database, according to this Cisco advisory. Cisco has released free software updates that address this vulnerability.
In January, Cisco warned that its Cisco Unified Communications Manager contains a heap overflow vulnerability in the Certificate Trust List that could allow a hacker to cause a denial-of-service attack or execute arbitrary code.