Multiple vulnerabilities exist in the Cisco PGW 2200 Softswitch series of products and they are related to processing Session Initiation Protocol (SIP) or Media Gateway Control Protocol (MGCP) messages.
SIP is a popular signaling protocol used to manage voice and video calls across IP networks such as the Internet. SIP is responsible for handling all aspects of call setup and termination. Voice and video are the most popular types of sessions that SIP handles, but the protocol is flexible to accommodate for other applications that require call setup and termination. SIP call signaling can use UDP (port 5060), TCP (port 5060), or Transport Layer Security (TLS; TCP port 5061) as the underlying transport protocol.
MGCP is the protocol for controlling telephony gateways from external call control elements known as media gateway controllers or call agents. A telephony gateway is a network element that provides conversion between the audio signals carried on telephone circuits and data packets carried over the Internet or other packet networks.
Multiple DoS vulnerabilities exist in the Cisco PGW 2200 Softswitch SIP implementation, and one vulnerability is in the MGCP implementation.
The following vulnerabilities can cause affected devices to crash:
- CSCsl39126 (registered customers only), CVE ID CVE-2010-0601
- CSCsk32606 (registered customers only), CVE ID CVE-2010-0602
- CSCsk40030 (registered customers only), CVE ID CVE-2010-0603
- CSCsk38165 (registered customers only), CVE ID CVE-2010-0604
- CSCsk44115 (registered customers only), CVE ID CVE-2010-1561
- CSCsj98521 (registered customers only), CVE ID CVE-2010-1562
- CSCsk04588 (registered customers only), CVE ID CVE-2010-1563
- CSCsz13590 (registered customers only), CVE ID CVE-2010-1567
The following vulnerability may cause an affected device to be unable to accept or create a new TCP connection. Existing calls will not be terminated, but no new SIP connections will be established. If exploited, this vulnerability will also prevent the device from establishing any new HTTP, SSH or Telnet sessions.
- CSCsk13561 (registered customers only), CVE ID CVE-2010-1565
There are no workarounds for the vulnerabilities in this advisory.
Read more on http://www.cisco.com/warp/public/707/cisco-sa-20100512-pgw.shtml