Summary
The remote host is running a SIP Express Router.
A bug has been found in the remote device which may allow an attacker to crash this device by sending a too long contact list in REGISTERs.
Solution
Upgrade to version 0.8.11 or use the patch provided at:
http://www.iptel.org/ser/security/secalert-002-0_8_10.patch
For additional details see: http://www.iptel.org/ser/security/
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- XnView JPEG2000 Plugin Buffer Overflow Vulnerability (Win)
- Simple Web Server Connection Header Buffer Overflow Vulnerability
- ImageMagick Multiple Denial of Service Vulnerabilities - 01 June13 (Windows)
- Personal File Share HTTP Server Remote Buffer Overflow Vulnerability
- VLC Media Player '.RM' File BOF Vulnerability (Windows)