Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> Session Initiation Protocol Detection


Vulnerability Assessment Details

Session Initiation Protocol Detection

Vulnerability Assessment Summary
Checks if the remote system understands the SIP protocol

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote system is a SIP signaling device.

Description :

The remote system is running software that speaks the Session
Initiation Protocol.

SIP is a messaging protocol to initiate communication sessions between
systems. It is a protocol used mostly in IP Telephony networks /
systems to setup, control and teardown sessions between two or more
systems.

See also :

http://en.wikipedia.org/wiki/Session_Initiation_Protocol

Solution :

If possible, filter incoming connections to the port so that it is
used by trusted sources only.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Ferdy Riphagen and Josh Zlatin-Amishav

Cables, Connectors

Corsair DDR3 Vengeance 8gb 2400mhz
$40.0
Corsair DDR3 Vengeance 8gb 2400mhz picture Corsair Vengeance LPX 16gb 2x8gb Dual Channel ddr4 2400mhz pc4-1
$8.31
 Corsair Vengeance LPX 16gb 2x8gb Dual Channel ddr4 2400mhz pc4-1 picture Corsair Vengeance LPX DDR4 16GB (2x8GB) 3200mhz RAM CMK16GX4M2B3
$8.35
 Corsair Vengeance LPX DDR4 16GB (2x8GB) 3200mhz RAM CMK16GX4M2B3 pictureCORSAIR Vengeance LPX 16GB (2 x 8GB) 288-Pin DDR4 SDRAM DDR4 320
$8.34
CORSAIR Vengeance LPX 16GB (2 x 8GB) 288-Pin DDR4 SDRAM DDR4 320 picture


Discussions

No Discussions have been posted on this vulnerability.