Hi Steffen,
* Steffen Joeris <[EMAIL PROTECTED]> [2008-05-02 14:46]:
> Package: sip-tester
> Severity: important
> Tags: Security
> 
> Hi
> 
> The following CVE(0) has been issued against sip-tester.
> 
> Please check, if it applies to the debian version.
> 
> CVE-2008-1959:
> Stack-based buffer overflow in the get_remote_video_port_media function
> in call.cpp in SIPp 3.0 allows remote attackers to cause a denial of
> service and possibly execute arbitrary code via a crafted SIP message.
> NOTE: some of these details are obtained from third party information.

BTW: the same issue affects get_remote_ip_media() and 
get_remote_ipv6_media(), both unfixed in latest upstream 
release (3.1) and the version in Debian:

    122 uint32_t get_remote_ip_media(char *msg)
    123 {
    124     char pattern[] = "c=IN IP4 ";
    125     char *begin, *end;
    126     char ip[32];
    127     begin = strstr(msg, pattern);
    128     if (!begin) {
    129       /* Can't find what we're looking at -> return no address */
    130       return INADDR_NONE;
    131     }
    132     begin += sizeof("c=IN IP4 ") - 1;
    133     end = strstr(begin, "\r\n");
    134     if (!end)
    135       return INADDR_NONE;
    136     memset(ip, 0, 32);
    137     strncpy(ip, begin, end - begin);
    138     return inet_addr(ip);
    139 }

    145 uint8_t get_remote_ipv6_media(char *msg, struct in6_addr addr)
    146 {
    147     char pattern[] = "c=IN IP6 ";
    148     char *begin, *end;
    149     char ip[128];
    150
    151     memset(&addr, 0, sizeof(addr));
    152     memset(ip, 0, 128);
    153
    154     begin = strstr(msg, pattern);
    155     if (!begin) {
    156       /* Can't find what we're looking at -> return no address */
    157       return 0;
    158     }
    159     begin += sizeof("c=IN IP6 ") - 1;
    160     end = strstr(begin, "\r\n");
    161     if (!end)
    162       return 0;
    163     strncpy(ip, begin, end - begin);


Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpJySwuqfSZ6.pgp
Description: PGP signature

Reply via email to