[nsp] Cisco Security Advisory: Multiple Product
Vulnerabilities found by PROTOS SIP Test Suite
Richard Aceves
raceves at cisco.com
Mon Feb 24 11:44:38 EST 2003
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Charles,
The ATA-186 devices are indeed affected. The bug ID for those devices is
CSCea26155, which can be tracked here:
http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl
You must have a Cisco.com userid to view the bug.
At the present time, we do not have word on when the fixed software will be
available but are working with the developers to expedite a fix. As soon
as we know a timetable for software fixes, we will update the
Advisory. Thank you for your inquiry.
Regards,
richard.
At 05:54 02/22/03 -0500, Charles Sprickman wrote:
>Just to clarify, are the ATA-186's affected?
>
>I believe they do not fall in this category since they do work in a NAT
>environment:
>
>"Cisco products that are not running the SIP protocol or that do not
>provide Network Address Translation (NAT) fixup services for the SIP
>protocol are not affected."
>
>Thanks,
>
>Charles
- --
Richard Aceves
Manager, Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
+1 (408) 526-7035
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1
iQA/AwUBPlp2Jfg/zCLC/3gNEQJeiACgh+aTFfOwbjXYt3CbmDLPyOrU7bwAn2V+
PMX7O9vAY3eDdnpE2lMyLY9P
=2J4O
-----END PGP SIGNATURE-----
More information about the cisco-nsp
mailing list