We encountered this problem after upgrading our ASAs from 9.6(3)1 to 9.6(4)3 to address current SSL vulnerability. When we did this users who connect to our Jabber environment for softphone services could no longer receive incoming calls (outgoing worked fine). Traces revealed that SIP invitation was using public instead of private IPs. TAC recommended disabling SIP inspection but this didn't work. After quite a few other attempts (different interim code, additional static NATs, etc) we did NO inspect SIP AND then did a clear xlate was the problem resolved. This isn't documented anywhere I could find so am sharing to save others similar pain.