The ConnectionBase::preparseNewBytes function in resip/stack/ConnectionBase.cxx in reSIProcate through 1.10.2 allows remote attackers to cause a denial of service (buffer overflow) or possibly execute arbitrary code when TLS communication is enabled.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/45174/ | patch exploit vdb entry third party advisory |
https://github.com/resiprocate/resiprocate/commit/2cb291191c93c7c4e371e22cb89805a5b31d6608 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2018/07/msg00031.html | third party advisory mailing list |
http://seclists.org/bugtraq/2018/Aug/14 | mailing list patch exploit third party advisory |
https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html | patch exploit vdb entry third party advisory |
http://joachimdezutter.webredirect.org/advisory.html | broken link |
https://lists.debian.org/debian-lts-announce/2021/12/msg00029.html | third party advisory mailing list |