Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka "extraneous messaging."
References
Configurations
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/38521 - | |
References | () http://secunia.com/advisories/27252 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3271 - | |
References | () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203 - | |
References | () http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt - Exploit | |
References | () http://www.securityfocus.com/archive/1/482476/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26118 - Exploit | |
References | () http://www.vupen.com/english/advisories/2007/3540 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37256 - |
Information
Published : 2007-10-23 17:46
Updated : 2024-11-21 00:38
NVD link : CVE-2007-5636
Mitre link : CVE-2007-5636
CVE.ORG link : CVE-2007-5636
JSON object : View
Products Affected
nortel
- ip_softphone_2050
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer