TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
851
This signature particularly for messages from UAS to UAC when the device using UDP for transport. No remedy is
available.
Signature ID: 34858
DOS vulnerability on Thomson SIP phone ST 2030 using the VIA Header
Threat Level: Warning
Industry ID: CVE-2007-4553 Bugtraq: 25446
Signature Description: Thomson ST2030 IP Phone is a hardphone, which uses the Session Initiation Protocol (SIP)
protocol. It will send an INVITE message which is used to initiate and maintain a communication session. Thomson
SpeedTouch 2030 VoIP phone 1.52.1 version and prior versions also vulnerable. In every SIP message Via field must,
this Via header field indicates the transport used for the transaction and identifies the location where the request is to be
sent. The attacker will send a crafted message where the a space is replaced by a slash after the SIP version in the VIA,
when the device receives this crafted message,then the device does not respond to any event provoking a DoS. This
signature particularly for messages from UAC to UAS when the device using TCP for transport. No remedy is
available.
Signature ID: 34859
DOS vulnerability on Thomson SIP phone ST 2030 using the VIA Header
Threat Level: Warning
Industry ID: CVE-2007-4553 Bugtraq: 25446
Signature Description: Thomson ST2030 IP Phone is a hardphone, which uses the Session Initiation Protocol (SIP)
protocol. It will send an INVITE message which is used to initiate and maintain a communication session. Thomson
SpeedTouch 2030 VoIP phone 1.52.1 version and prior versions also vulnerable. In every SIP message Via field must,
this Via header field indicates the transport used for the transaction and identifies the location where the response is to
be sent. The attacker will send a crafted message where the a space is replaced by a slash after the SIP version in the
VIA, when the device receives this crafted message, then the device does not respond to any event provoking a DoS.
This signature particularly for messages from UAS to UAC when the device using TCP for transport. No remedy is
available.
Signature ID: 34860
DOS vulnerability on Thomson SIP phone ST 2030 using the To Header
Threat Level: Warning
Industry ID: CVE-2007-4753
Signature Description: Thomson ST2030 IP Phone is a hardphone, which uses the Session Initiation Protocol (SIP)
protocol. It will send an INVITE message which is used to initiate and maintain a communication session. In this
message To header field contains address-of-record of the user or resource that is the target of the request. Attacker will
send message with crafted uri in To field, after receiving this message, the device looks functional but in fact does not
respond to any event provoking a DoS. This signature particularly for messages from UAC to UAS when the device
using UDP for transport. No remedy is available.
Signature ID: 34861
DOS vulnerability on Thomson SIP phone ST 2030 using the To Header
Threat Level: Warning
Industry ID: CVE-2007-4753
Signature Description: Thomson ST2030 IP Phone is a hardphone, which uses the Session Initiation Protocol (SIP)
protocol. It will send an INVITE message which is used to initiate and maintain a communication session. In this
message To header field contains address-of-record of the user or resource that is the target of the request. Attacker will
send message with crafted uri in To field, after receiving this message the device looks functional but in fact does not
respond to any event provoking a DoS. This signature particularly for messages from UAS to UAC when the device
using UDP for transport. No remedy is available.