CVE-2007-4924

The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html Patch
http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20
http://osvdb.org/41637
http://secunia.com/advisories/27118 Patch Vendor Advisory
http://secunia.com/advisories/27128 Patch Vendor Advisory
http://secunia.com/advisories/27129 Patch Vendor Advisory
http://secunia.com/advisories/27271
http://secunia.com/advisories/27524
http://secunia.com/advisories/28380
http://www.mandriva.com/security/advisories?name=MDKSA-2007:205
http://www.redhat.com/support/errata/RHSA-2007-0957.html Patch
http://www.s21sec.com/avisos/s21sec-037-en.txt
http://www.securityfocus.com/archive/1/482120/30/4500/threaded
http://www.securityfocus.com/bid/25955
http://www.securitytracker.com/id?1018776
http://www.ubuntu.com/usn/usn-562-1
http://www.vupen.com/english/advisories/2007/3413
http://www.vupen.com/english/advisories/2007/3414
https://bugzilla.redhat.com/show_bug.cgi?id=296371
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398
https://www.exploit-db.com/exploits/9240
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html Patch
http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20
http://osvdb.org/41637
http://secunia.com/advisories/27118 Patch Vendor Advisory
http://secunia.com/advisories/27128 Patch Vendor Advisory
http://secunia.com/advisories/27129 Patch Vendor Advisory
http://secunia.com/advisories/27271
http://secunia.com/advisories/27524
http://secunia.com/advisories/28380
http://www.mandriva.com/security/advisories?name=MDKSA-2007:205
http://www.redhat.com/support/errata/RHSA-2007-0957.html Patch
http://www.s21sec.com/avisos/s21sec-037-en.txt
http://www.securityfocus.com/archive/1/482120/30/4500/threaded
http://www.securityfocus.com/bid/25955
http://www.securitytracker.com/id?1018776
http://www.ubuntu.com/usn/usn-562-1
http://www.vupen.com/english/advisories/2007/3413
http://www.vupen.com/english/advisories/2007/3414
https://bugzilla.redhat.com/show_bug.cgi?id=296371
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398
https://www.exploit-db.com/exploits/9240
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*
cpe:2.3:a:openh323_project:openh323:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html -
References () http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html - Patch () http://mail.gnome.org/archives/ekiga-list/2007-September/msg00103.html - Patch
References () http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20 - () http://openh323.cvs.sourceforge.net/openh323/opal/src/sip/sippdu.cxx?r1=2.83.2.19&r2=2.83.2.20 -
References () http://osvdb.org/41637 - () http://osvdb.org/41637 -
References () http://secunia.com/advisories/27118 - Patch, Vendor Advisory () http://secunia.com/advisories/27118 - Patch, Vendor Advisory
References () http://secunia.com/advisories/27128 - Patch, Vendor Advisory () http://secunia.com/advisories/27128 - Patch, Vendor Advisory
References () http://secunia.com/advisories/27129 - Patch, Vendor Advisory () http://secunia.com/advisories/27129 - Patch, Vendor Advisory
References () http://secunia.com/advisories/27271 - () http://secunia.com/advisories/27271 -
References () http://secunia.com/advisories/27524 - () http://secunia.com/advisories/27524 -
References () http://secunia.com/advisories/28380 - () http://secunia.com/advisories/28380 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:205 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:205 -
References () http://www.redhat.com/support/errata/RHSA-2007-0957.html - Patch () http://www.redhat.com/support/errata/RHSA-2007-0957.html - Patch
References () http://www.s21sec.com/avisos/s21sec-037-en.txt - () http://www.s21sec.com/avisos/s21sec-037-en.txt -
References () http://www.securityfocus.com/archive/1/482120/30/4500/threaded - () http://www.securityfocus.com/archive/1/482120/30/4500/threaded -
References () http://www.securityfocus.com/bid/25955 - () http://www.securityfocus.com/bid/25955 -
References () http://www.securitytracker.com/id?1018776 - () http://www.securitytracker.com/id?1018776 -
References () http://www.ubuntu.com/usn/usn-562-1 - () http://www.ubuntu.com/usn/usn-562-1 -
References () http://www.vupen.com/english/advisories/2007/3413 - () http://www.vupen.com/english/advisories/2007/3413 -
References () http://www.vupen.com/english/advisories/2007/3414 - () http://www.vupen.com/english/advisories/2007/3414 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=296371 - () https://bugzilla.redhat.com/show_bug.cgi?id=296371 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11398 -
References () https://www.exploit-db.com/exploits/9240 - () https://www.exploit-db.com/exploits/9240 -

Information

Published : 2007-10-08 21:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4924

Mitre link : CVE-2007-4924

CVE.ORG link : CVE-2007-4924


JSON object : View

Products Affected

ekiga

  • ekiga

openh323_project

  • openh323
CWE
CWE-20

Improper Input Validation