1 results (0.002 seconds)

CVSS: 5.0EPSS: 16%CPEs: 2EXPL: 1

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address." Open Phone Abstraction Library (opal), como la usada en (1) Ekiga anterior a 2.0.10 y (2) OpenH323 anterior a 2.2.4, permite a atacantes remotos provocar una denegación de servicio (caída) mediante una cabecera Content-Length inválida en paquetes SIP del Protocolo de Inicio de Sesión (SIP, Session Initiation Protocol), lo cual provoca que el byte \0 sea escrito en una "dirección controlada por el atacante". • https://www.exploit-db.com/exploits/9240 http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20 http://osvdb.org/41637 http://secunia.com/advisories/27118 http://secunia.com/advisories/27128 http://secunia.com/advisories/27129 http://secunia.com/advisories/27271 http://secunia.com/ • CWE-20: Improper Input Validation •