Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> Session Initiation Protocol Detection


Vulnerability Assessment Details

Session Initiation Protocol Detection

Vulnerability Assessment Summary
Checks if the remote system understands the SIP protocol

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote system is a SIP signaling device.

Description :

The remote system is running software that speaks the Session
Initiation Protocol.

SIP is a messaging protocol to initiate communication sessions between
systems. It is a protocol used mostly in IP Telephony networks /
systems to setup, control and teardown sessions between two or more
systems.

See also :

http://en.wikipedia.org/wiki/Session_Initiation_Protocol

Solution :

If possible, filter incoming connections to the port so that it is
used by trusted sources only.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Ferdy Riphagen and Josh Zlatin-Amishav

Cables, Connectors

ATARI 800XL Computer With Power Supply. Powers On. Untested.
$45.0
ATARI 800XL Computer With Power Supply. Powers On. Untested. pictureATARI SF354 3.5" DISK DRIVE FOR 520/1040 ST w/Power Adapter Parts/Repair only
$110.0
ATARI SF354 3.51986 ORBITER Space Shuttle Simulation RARE 1 Disk Atari ST 512k
$24.95
1986 ORBITER Space Shuttle Simulation RARE 1 Disk Atari ST 512k pictureHighly Rated Tower Toppler by Epyx/US Gold for Atari ST
$24.95
Highly Rated Tower Toppler by Epyx/US Gold for Atari ST picture


Discussions

No Discussions have been posted on this vulnerability.