exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

s21sec-037-en.txt

s21sec-037-en.txt
Posted Oct 12, 2007
Authored by Jose Miguel Esparza | Site s21sec.com

OPAL versions 2.2.8 and below and Ekiga versions 2.0.9 and below suffer from a denial of service condition due to insufficiently validating the Content-Length field of a SIP request.

tags | advisory, denial of service
SHA-256 | 4d364df06d8fbbc07a007d1e0a7b5b491550f9b20da4c09aa796e46c096883f4

s21sec-037-en.txt

Change Mirror Download
##############################################################
- S21Sec Advisory -
##############################################################

Title: OPAL SIP Protocol Remote Denial of Service
ID: S21SEC-037-en
Severity: Medium - Remote DoS
History: 11.Jun.2007 Vulnerability discovered
09.Jul.2007 Vendor contacted
15.Aug.2007 Patched
17.Sep.2007 New version released

Scope: Remote Denial of Service
Platforms: Any
Author: Jose Miguel Esparza (jesparza@s21sec.com)
URL: http://www.s21sec.com/avisos/s21sec-037-en.txt
Release: Public


[ SUMMARY ]

OPAL (Open Phone Abstraction Layer) is an implementation of various
telephony and video communication
protocols for use over packet based networks. It's based on code from
the OpenH323 project and adds new
features such as a stream based architecture, better support for re-
use or removal of sub-components,
and explicit support for additional protocols.


[ AFFECTED VERSIONS ]

Following versions are affected with this issue:

- OPAL 2.2.8 and prior.

Some applications which use this library are affected too:

- Ekiga 2.0.9 and prior.


[ DESCRIPTION ]

File: sippdu.cxx
Function: SIP_PDU::Read(OpalTransport & transport)
Instruction: entityBody[contentLength] = '\0';

An insufficient input validation of the Content-Length field of a SIP
request cause the application to
crash due to a memory mismanagement.


[ WORKAROUND ]

A patch in the url http://openh323.cvs.sourceforge.net/openh323/opal/
src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20
is available, but upgrading to new version 2.2.10 is recommended.


[ ACKNOWLEDGMENTS ]

This vulnerability have been found and researched by:

- Jose Miguel Esparza <jesparza@s21sec.com> S21sec labs


[ ADDITIONAL INFORMATION ]

This vulnerability has been discovered during the development of the
network fuzzer Malybuzz, available in the url
http://malybuzz.sourceforge.net/


[ REFERENCES ]

* OpenH323 Project
http://openh323.sourceforge.net/

* Ekiga
http://ekiga.org

* S21Sec
http://www.s21sec.com
http://blog.s21sec.com

* Malybuzz
http://malybuzz.sourceforge.net/
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close