The CERT Coordination Center on Thursday warned of numerous security
vulnerabilities in vendor implementations of Session Initiation Protocol
(SIP), a signaling protocol for Web conferencing, telephony, presence,
events notification and instant messaging.
alert from CERT/CC said the vulnerabilities open the doors for an
attacker to gain unauthorized privileged access, cause denial-of-service
attacks, or cause unstable system behavior.
It warned that text-based SIP
Voice-over IP telephony, instant messaging and other presence applications,
contained holes in the subset related to invite message. Tests on a
variety of popular SIP-enabled products detected “unexpected system behavior
and denial-of-services to remote code execution.”
The Center recommended that SIP-enabled devices and services be disabled
until vendor patches are made available. “As a temporary measure, it may
be possible to limit the scope of these vulnerabilities by blocking access
to SIP devices and services at the network perimeter,” CERT/CC said.
SIP-enabled products from IPTel and Nortel Networks were found to be