Vulnerability Name:

CVE-2006-4194

Assigned:2006-08-16
Published:2006-08-16
Updated:2018-10-30
Summary:** DISPUTED ** Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032.
Note: the vendor, after working with the researcher, has been unable to reproduce the issue.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
References:Source: MITRE
Type: CNA
CVE-2006-4194

Source: MISC
Type: UNKNOWN
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1207450,00.html

Source: CISCO
Type: UNKNOWN
20060815 Unconfirmed SIP Inspection Vulnerability

Source: MISC
Type: UNKNOWN
http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/

Source: MISC
Type: UNKNOWN
http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5

Source: OSVDB
Type: UNKNOWN
29781

Source: BID
Type: UNKNOWN
19536

Vulnerable Configuration:Configuration 1:
  • cpe:/h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco pix firewall 501 *
    cisco pix firewall 506 *
    cisco pix firewall 515 *
    cisco pix firewall 515e *
    cisco pix firewall 520 *
    cisco pix firewall 525 *
    cisco pix firewall 535 *
    cisco pix firewall software 6.3