First published: Mon Sep 17 2007(Updated: )
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openh323 Project Openh323 | <=2.2.3 | |
Ekiga Ekiga | <=2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4924 is classified as a denial of service vulnerability.
To fix CVE-2007-4924, update Ekiga to version 2.0.10 or later and OpenH323 to version 2.2.4 or later.
CVE-2007-4924 affects Ekiga versions up to 2.0.9 and OpenH323 versions up to 2.2.3.
CVE-2007-4924 can be exploited through malicious SIP packets containing an invalid Content-Length header.
CVE-2007-4924 was reported in September 2007.