Описание
The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-1110
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11379
- http://securitytracker.com/id?1006167
- http://www.cert.org/advisories/CA-2003-06.html
- http://www.cs.columbia.edu/~xiaotaow/sipc/ouspg.html
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip
- http://www.kb.cert.org/vuls/id/528719
- http://www.securityfocus.com/bid/6904
EPSS
CVE ID
Связанные уязвимости
The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
EPSS