[nsp] Cisco Security Advisory: Multiple Product Vulnerabilities found by PROTOS SIP Test Suite

Richard Aceves raceves at cisco.com
Mon Feb 24 11:44:38 EST 2003


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Charles,

The ATA-186 devices are indeed affected.  The bug ID for those devices is 
CSCea26155, which can be tracked here:

http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl

You must have a Cisco.com userid to view the bug.

At the present time, we do not have word on when the fixed software will be 
available but are working with the developers to expedite a fix.  As soon 
as we know a timetable for software fixes, we will update the 
Advisory.  Thank you for your inquiry.


Regards,

richard.

At 05:54 02/22/03 -0500, Charles Sprickman wrote:
>Just to clarify, are the ATA-186's affected?
>
>I believe they do not fall in this category since they do work in a NAT
>environment:
>
>"Cisco products that are not running the SIP protocol or that do not
>provide Network Address Translation (NAT) fixup services for the SIP
>protocol are not affected."
>
>Thanks,
>
>Charles

- --
Richard Aceves
Manager, Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
+1 (408) 526-7035
http://www.cisco.com/go/psirt

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBPlp2Jfg/zCLC/3gNEQJeiACgh+aTFfOwbjXYt3CbmDLPyOrU7bwAn2V+
PMX7O9vAY3eDdnpE2lMyLY9P
=2J4O
-----END PGP SIGNATURE-----



More information about the cisco-nsp mailing list