sip.edu - sipXtapi Buffer Overflow
Subject: SIP in higher education
List archive
- From: Candace Holman <>
- To:
- Cc:
- Subject: sipXtapi Buffer Overflow
- Date: Mon, 10 Jul 2006 18:40:17 -0400
Fyi, released today. Excerpted from SANS @RISK:
SIPfoundry sipXtapi Buffer Overflow
Affected:
sipXtapi library versions compiled before 24-Mar-2006
PingTel products compiled against those versions of the library
AOL Triton products compiled against those versions of the library
Details: SIPfoundry is an international software community dedicated to
accelerating the adoption of SIP (Session Initiation Protocol)-based
VoIP solutions. One of SIPfoundry's products, the sipXtapi library, is
used by multiple cross-platform VoIP applications. This library contains
a buffer overflow that can be triggered by sending a "CSeq" SIP header
field larger than 24 bytes. An attacker can exploit the flaw to execute
arbitrary code with the privileges of the user running the affected
application. Note that several common user applications, including AOL's
Triton messaging application, are compiled using vulnerable versions of
the library. Exploit code for this vulnerability has been publicly
posted.
Status: SIPfoundry confirmed, updates available. Updates from PingTel
and AOL are also available.
References:
Posting by Michael Thumann
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0160.html
SIPfoundry sipXtapi Home Page
http://www.sipfoundry.org/sipXtapi/index.html SIPfoundry Home Page
http://www.sipfoundry.org/
SecurityFocus BID
http://www.securityfocus.com/bid/18906
- sipXtapi Buffer Overflow, Candace Holman, 07/10/2006
Archive powered by MHonArc 2.6.16.