Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11654

Опубликовано: 26 июл. 2017
Источник: debian

Описание

An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sipcrackunfixedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2017/07/26/1

  • Negligible security impact

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 8 лет назад

An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic.

CVSS3: 5.9
nvd
больше 8 лет назад

An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic.

CVSS3: 5.9
github
больше 3 лет назад

An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic.