Vulnerability Description
The Session Initiation Protocol (SIP) implementation in Nortel Networks Succession Communication Server 2000, when using SIP-T, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nortel | Succession Communication Server 2000 | All versions |
References
- http://www.cert.org/advisories/CA-2003-06.htmlThird Party AdvisoryUS Government Resource
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/Exploit
- http://www.kb.cert.org/vuls/id/528719Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/6904Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11379
- http://www.cert.org/advisories/CA-2003-06.htmlThird Party AdvisoryUS Government Resource
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/Exploit
- http://www.kb.cert.org/vuls/id/528719Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/6904Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11379
FAQ
What is CVE-2003-1115?
CVE-2003-1115 is a vulnerability with a CVSS score of 7.5 (HIGH). The Session Initiation Protocol (SIP) implementation in Nortel Networks Succession Communication Server 2000, when using SIP-T, allows remote attackers to cause a denial of service and possibly execut...
How severe is CVE-2003-1115?
CVE-2003-1115 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1115?
Check the references section above for vendor advisories and patch information. Affected products include: Nortel Succession Communication Server 2000.