Vulnerability Description
The Session Initiation Protocol (SIP) implementation in IPTel SIP Express Router 0.8.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iptel | Sip Express Router | 0.8.8 |
References
- http://www.cert.org/advisories/CA-2003-06.htmlThird Party AdvisoryUS Government Resource
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/Exploit
- http://www.iptel.org/ser/security/
- http://www.kb.cert.org/vuls/id/528719Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/6904Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11379
- http://www.cert.org/advisories/CA-2003-06.htmlThird Party AdvisoryUS Government Resource
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/Exploit
- http://www.iptel.org/ser/security/
- http://www.kb.cert.org/vuls/id/528719Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/6904Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11379
FAQ
What is CVE-2003-1113?
CVE-2003-1113 is a vulnerability with a CVSS score of 7.5 (HIGH). The Session Initiation Protocol (SIP) implementation in IPTel SIP Express Router 0.8.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted ...
How severe is CVE-2003-1113?
CVE-2003-1113 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1113?
Check the references section above for vendor advisories and patch information. Affected products include: Iptel Sip Express Router.