The ConnectionBase::preparseNewBytes function in resip/stack/ConnectionBase.cxx in reSIProcate through 1.10.2 allows remote attackers to cause a denial of service (buffer overflow) or possibly execute arbitrary code when TLS communication is enabled.
References
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://joachimdezutter.webredirect.org/advisory.html - Broken Link | |
References | () http://seclists.org/bugtraq/2018/Aug/14 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/resiprocate/resiprocate/commit/2cb291191c93c7c4e371e22cb89805a5b31d6608 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00031.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html - Exploit, Patch, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/45174/ - Exploit, Patch, Third Party Advisory, VDB Entry |
Information
Published : 2018-07-16 20:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12584
Mitre link : CVE-2018-12584
CVE.ORG link : CVE-2018-12584
JSON object : View
Products Affected
resiprocate
- resiprocate
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')