Some voice-enabled IP networks could be at risk for denial-of-service (define) and buffer overflow (define) attacks as a result of a security flaw in the H.323 (define) networking protocol for transmitting audio-visual data. According to an alert from the U.K. National Infrastructure Security Co-Ordination Centre (NISCC), the security vulnerability was identified in the H.323 protocol, which is used for the transmission of real-time audio, video and data information over packet switched-based networks. . . .
Some voice-enabled IP networks could be at risk for denial-of-service (define) and buffer overflow (define) attacks as a result of a security flaw in the H.323 (define) networking protocol for transmitting audio-visual data.

According to an alert from the U.K. National Infrastructure Security Co-Ordination Centre (NISCC), the security vulnerability was identified in the H.323 protocol, which is used for the transmission of real-time audio, video and data information over packet switched-based networks.

"Many vendors include support for this protocol in their products and may be impacted to varying degrees," NISCC warned, adding that exploitation of the security flaw could allow an attacker to create a DoS condition in an IP network. "There are indications that it may be possible for an attacker to execute code as a result of a buffer overflow."

Multiple vendors, including Cisco (Quote, Chart), Microsoft and Hewlett-Packard (Quote, Chart) use the H.323 protocol in networking and data transmission products.

Cisco, which has been aggressive in the VoIP market, confirmed the implementation of the H.323 protocol in its products could lead to security problems.

The link for this article located at InternetNews.com is no longer available.