Family: Denial of Service --> Category: denial
sipXtapi CSeq Field Header Denial of Service Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Sends an SIP packet with a bad CSeq field
Detailed Explanation for this Vulnerability Test
The remote host contains an application that is vulnerable to a remote
buffer overflow attack.
The remote host is running a SIP user agent that appears to be
compiled using a version of SIP Foundry's SipXtapi library before
March 24, 2006. Such versions contain a buffer overflow flaw that is
triggered when processing a specially-crafted packet with a long value
for the 'CSeq' field. A remote attacker may be able to exploit this
issue to execute arbitrary code on the affected host subject to the
rights of the current user.
See also :
Contact the software vendor to see if an upgrade is available.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.