Vulnerability Details : CVE-2007-0961
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
Vulnerability category: Denial of service
Products affected by CVE-2007-0961
- cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:asa_5500:6.3:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-0961
7.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-0961
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
References for CVE-2007-0961
-
http://www.securitytracker.com/id?1017652
-
http://www.securityfocus.com/bid/22561
-
http://www.kb.cert.org/vuls/id/430969
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32487
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32501
-
http://secunia.com/advisories/24180
Patch;Vendor Advisory
-
http://secunia.com/advisories/24160
Vendor Advisory
-
http://www.securityfocus.com/bid/22562
-
http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml
Patch;Vendor Advisory
-
http://osvdb.org/33054
-
http://www.vupen.com/english/advisories/2007/0608
-
http://securitytracker.com/id?1017651
Patch
-
http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml
Patch;Vendor Advisory
-
http://secunia.com/advisories/24179
Jump to