---------------------------------------------------------------------- Looking for a job? Secunia is hiring skilled researchers and talented developers. http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Cisco PGW 2200 Softswitch Multiple Denial of Service Vulnerabilities SECUNIA ADVISORY ID: SA39733 VERIFY ADVISORY: http://secunia.com/advisories/39733/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco PGW 2200 Softswitch, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) Multiple unspecified errors exist in the processing of Session Initiation Protocol (SIP) messages, which can be exploited to cause an affected system to crash. 2) An unspecified error exists in the processing of Media Gateway Control Protocol (MGCP) messages, which can be exploited to cause an affected system to crash. 3) An unspecified error can be exploited to exhaust all TCP sockets and cause an affected system to be unable to accept or create new TCP connections. SOLUTION: Update to Cisco PGW 2200 Softswitch version 9.7(3)S11 or 9.8(1)S5 or later. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Cisco (cisco-sa-20100512-pgw): http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml OTHER REFERENCES: Cisco Applied Mitigation Bulletin: http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080b2c51a.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------