|
Family: Denial of Service --> Category: denial
sipXtapi CSeq Field Header Denial of Service Vulnerability Vulnerability Scan
Vulnerability Scan Summary Sends an SIP packet with a bad CSeq field
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote host contains an application that is vulnerable to a remote
buffer overflow attack.
Description :
The remote host is running a SIP user agent that appears to be
compiled using a version of SIP Foundry's SipXtapi library before
March 24, 2006. Such versions contain a buffer overflow flaw that is
triggered when processing a specially-crafted packet with a long value
for the 'CSeq' field. A remote attacker may be able to exploit this
issue to execute arbitrary code on the affected host subject to the
rights of the current user.
See also :
http://www.securityfocus.com/archive/1/439617/30/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html
Solution :
Contact the software vendor to see if an upgrade is available.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|