Описание
The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
Ссылки
- Patch
- Third Party AdvisoryUS Government Resource
- Patch
- Exploit
- Third Party AdvisoryUS Government Resource
- Patch
- Third Party AdvisoryUS Government Resource
- Patch
- Exploit
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:columbia_university:sipc:1.74:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.24609
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The Session Initiation Protocol (SIP) implementation in Columbia SIP User Agent (sipc) 1.74 and other versions before sipc 2.0 build 2003-02-21 allows remote attackers to cause a denial of service or execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
EPSS
Процентиль: 96%
0.24609
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other