[VOIPSEC] forwarding buffer overflow for sipxapi
Smith, Donald
Donald.Smith at qwest.com
Tue Jul 11 12:11:02 CDT 2006
This may impact some of you. I removed the actual exploit code from the
announcement.
ERNW Security Advisory 02-2006
Buffer Overflow in SIP Foundry's SipXtapi
Author:
Michael Thumann <mthumann[at]ernw.de>
Homepage: www.ernw.de
1. Summary:
The sipXtapi library from sip foundry contains a buffer overflow when
parsing the CSeq field.
This flaw can be used by an attacker to gain control over EIP and
execute arbitrary code.
2. Severity : Critical
3. Products affected
- sipXtapi: all version compiled before 24 of march 2006
- PingTel products
- AOL Triton
4. Patch Availability :
A patch is available within the source tree and the affected products of
PingTel and AOL
have beed updated.
5. Details
Sending a CSeq field value greater than 24 bytes triggers the buffer
ovlerflow condition.
6. Solution
Update the affected products to the actual version.
7. Time-Line
20 Mar 2006: Vulnerability reported to vendor
20 Mar 2006: Answer from vendor
24 Mar 2006: Patch available
10 July 2006: Public Disclosure
8. Exploit
<SNIP> I don't usually publish exploits. If you need it for testing you
can find it.
9. Thanks
We would like to thank the guys from sip foundry for working together on
this issue in a professional and
responsible way.
10. Disclaimer
The informations in this advisory are provided "AS IS" without warranty
of any kind. In no event shall the authors be liable for any damages
whatsoever including direct, indirect, incidental, consequential,
loss of business profits or special damages due to the misuse of any
information provided in this advisory.
Our IDS reports a false negative rate of 0 (Dr J).
Donald.Smith at qwest.com giac
This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful. If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.
More information about the Voipsec
mailing list