Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qpm3-phwq-qgg4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.

The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.

EPSS

Процентиль: 96%
0.24609
Средний

Связанные уязвимости

nvd
около 22 лет назад

The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.

EPSS

Процентиль: 96%
0.24609
Средний