IAXClient Open Source Library iax_net_read Function Packet Handling Remote Overflow

medium Nessus Plugin ID 21684

Synopsis

The remote softphone is prone to multiple buffer overflow attacks.

Description

The remote host appears to be using a VoIP software phone application that is affected by multiple buffer overflows. With specially crafted UDP packets, an unauthenticated, remote attacker may be able to leverage these issues to crash the affected application or to execute arbitrary code on the remote host subject to the privileges of the user running it.

Solution

Obtain to a version of the client application built using a version of IAXClient from June 6 2006 or later.

See Also

https://www.secureauth.com/?idx=548&idxseccion=10

https://www.securityfocus.com/archive/1/436638/30/0/threaded

Plugin Details

Severity: Medium

ID: 21684

File Name: iaxclient_truncated_frames_overflow.nasl

Version: 1.19

Type: remote

Published: 6/12/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/6/2006

Exploitable With

Core Impact

Reference Information

CVE: CVE-2006-2923

BID: 18307