An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/07/26/1 | mailing list exploit third party advisory |
http://www.securityfocus.com/bid/100023 | vdb entry third party advisory broken link |