[VOIPSEC] UPDATES!! eStara softphone overflow & Cisco IP Phone 7940 DoS
Smith, Donald
Donald.Smith at qwest.com
Mon Jan 16 12:31:59 CST 2006
Eric Xu wrote:
> Forgive me: I changed the email "Subject" to make this discussion
> more specific to these two problems. ;)
>
> There is another source about the eStara vulnerability mentioned in
> Simth's email post:
> See: http://www.milw0rm.com/
> 2006-01-12 eStara Softphone <= 3.0.1.46 (SIP) Remote Buffer
> Overflow Exploit 2006-01-12 eStara Softphone <= 3.0.1.46
> (SIP) Remote Buffer Overflow Exploit
>
> Well, I am more interested in this one:
> http://www.milw0rm.com/id.php?id=1411 2006-01-10 Cisco IP
> Phone 7940 (Reboot) Denial of Service Exploit
>
> Any other clues or comments from members here?
>
> Cheers/Eric
Dan Obregon [dan at estara.com] provided me this information re: the eStara
SoftPhone SIP overflow.
"We're writing to inform you that the issue regarding "eStara SoftPhone
SIP Packets Handling Buffer Overflow Vulnerability" has been resolved.
Resolved in version 3.0.1.47, which is available at our website:
http://www.estara.com/softphone/, customers can simply download a new
copy via their purchased URLs. If they go to Help -> About and it
shows 3.0.1.47 then they're safe."
Jeff Lanza from cisco provided this information re: cisco 7940 dos.
"I saw your message to the voipsec
list and wanted to make you aware that we have published a Cisco
Security
Response to address any concerns over the exploit posted to milw0rm.com.
You can find this document on our site at:
http://www.cisco.com/warp/public/707/cisco-response-20060113-ip-phones.s
html "
One final comment from me.
It doesn't usually take a 1000 packets to dos the ip stacks found on
appliances such as ip phones.
"Pampers use multiple layers of protection to prevent leakage. Rommel
used defense in depth to defend European fortresses." (Andrew White)
Donald.Smith at qwest.com giac
More information about the Voipsec
mailing list