A memory leak was found in the way SIPcrack 0.2 handled processing of SIP traffic, because a lines array was mismanaged. A remote attacker could potentially use this flaw to crash long-running sipdump network sniffing sessions.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2017/07/26/1 | mailing list exploit third party advisory |
http://www.securityfocus.com/bid/100024 | vdb entry third party advisory broken link |