CVE-2008-3210

rutil/dns/DnsStub.cxx in ReSIProcate 1.3.2, as used by repro, allows remote attackers to cause a denial of service (daemon crash) via a SIP (1) INVITE or (2) OPTIONS message with a long domain name in a request URI, which triggers an assert error.
Configurations

Configuration 1 (hide)

cpe:2.3:a:resiprocate:resiprocate:1.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://labs.mudynamics.com/advisories/MU-200807-01.txt - Exploit () http://labs.mudynamics.com/advisories/MU-200807-01.txt - Exploit
References () http://secunia.com/advisories/31058 - Vendor Advisory () http://secunia.com/advisories/31058 - Vendor Advisory
References () http://securityreason.com/securityalert/4013 - () http://securityreason.com/securityalert/4013 -
References () http://www.resiprocate.org/ReSIProcate_1.3.3_Release - Patch () http://www.resiprocate.org/ReSIProcate_1.3.3_Release - Patch
References () http://www.securityfocus.com/bid/30194 - Exploit () http://www.securityfocus.com/bid/30194 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43770 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43770 -
References () https://www.exploit-db.com/exploits/6046 - () https://www.exploit-db.com/exploits/6046 -

Information

Published : 2008-07-18 15:13

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3210

Mitre link : CVE-2008-3210

CVE.ORG link : CVE-2008-3210


JSON object : View

Products Affected

resiprocate

  • resiprocate
CWE
CWE-20

Improper Input Validation