First published: Wed Sep 19 2007(Updated: )
José Miguel Esparza discovered that insufficient input validation is performed on SIP protocol header field 'Content-Length' by opal library used by ekiga. This flaw can be used to write '\0' byte to attacker-controlled address and crash ekiga. Ekiga 2.0.10 using opal library 2.2.10 was released to address this issue. Ekiga 2.0.10 release notes: <a href="http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html">http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html</a> CVS commit pointed out by upstream: <a href="http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20&pathrev=Phobos">http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20&pathrev=Phobos</a> (some of the previous commits may be required to get complete checks / fix)
Affected Software | Affected Version | How to fix |
---|---|---|
Ekiga | ||
Opal Opal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-296371 is considered high due to the potential for denial of service.
To fix REDHAT-BUG-296371, update to the patched version of the Ekiga or Opal library as indicated in the official channels.
REDHAT-BUG-296371 is caused by insufficient input validation on the SIP protocol header field 'Content-Length' in the opal library.
REDHAT-BUG-296371 affects the Ekiga application and the Opal library.
Yes, REDHAT-BUG-296371 can be exploited remotely by sending specially crafted SIP messages to the vulnerable application.