Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w77f-7cjw-q58r

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple format string vulnerabilities in eStara SIP softphone allow remote attackers to cause a denial of service (hang) via SIP INVITE requests with format string specifiers in the SDP session description, as demonstrated using (1) the field name, (2) the o field (owner/creator and session identifier), or (3) the m field (media name and transport address).

Multiple format string vulnerabilities in eStara SIP softphone allow remote attackers to cause a denial of service (hang) via SIP INVITE requests with format string specifiers in the SDP session description, as demonstrated using (1) the field name, (2) the o field (owner/creator and session identifier), or (3) the m field (media name and transport address).

EPSS

Процентиль: 89%
0.04701
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Multiple format string vulnerabilities in eStara SIP softphone allow remote attackers to cause a denial of service (hang) via SIP INVITE requests with format string specifiers in the SDP session description, as demonstrated using (1) the field name, (2) the o field (owner/creator and session identifier), or (3) the m field (media name and transport address).

EPSS

Процентиль: 89%
0.04701
Низкий