ID CVE-2006-3524
Summary Buffer overflow in SIPfoundry sipXtapi released before 20060324 allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.
References
Vulnerable Configurations
  • cpe:2.3:a:sipfoundry:sipxtapi:*:*:*:*:*:*:*:*
    cpe:2.3:a:sipfoundry:sipxtapi:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:47)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18906
bugtraq
  • 20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)
  • 20060711 Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)
fulldisc
  • 20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)
  • 20060711 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)
osvdb 27122
sectrack 1016455
secunia 20997
vupen ADV-2006-2735
xf sipxtapi-cseq-bo(27681)
saint via4
bid 18906
description sipXtapi Cseq header buffer overflow
id misc_sipxtapi
osvdb 27122
title sipxtapi_cseq
type remote
Last major update 18-10-2018 - 16:47
Published 12-07-2006 - 00:05
Last modified 18-10-2018 - 16:47
Back to Top