Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4924

Опубликовано: 08 окт. 2007
Источник: ubuntu
Приоритет: low
CVSS2: 5

Описание

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."

РелизСтатусПримечание
dapper

released

2.2.1-1ubuntu1.1
devel

not-affected

edgy

released

2.2.3.dfsg-0ubuntu2.1
feisty

released

2.2.3.dfsg-2ubuntu2.1
gutsy

not-affected

upstream

released

2.2.11

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

gutsy

not-affected

upstream

released

2.2.4

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."

nvd
почти 18 лет назад

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."

debian
почти 18 лет назад

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before ...

github
больше 3 лет назад

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."

5 Medium

CVSS2

Уязвимость CVE-2007-4924