Описание
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.2.1-1ubuntu1.1 |
devel | not-affected | |
edgy | released | 2.2.3.dfsg-0ubuntu2.1 |
feisty | released | 2.2.3.dfsg-2ubuntu2.1 |
gutsy | not-affected | |
upstream | released | 2.2.11 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | |
edgy | not-affected | |
feisty | not-affected | |
gutsy | not-affected | |
upstream | released | 2.2.4 |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before ...
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
5 Medium
CVSS2