vendor:
sipXtapi
by:
mthumann@ernw.de
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: sipXtapi
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Not provided
CPE: a:sipxtapi
Platforms Tested:
2006
Remote Buffer Overflow in sipXtapi
This PoC exploit demonstrates a remote buffer overflow vulnerability in sipXtapi. It sends a crafted INVITE packet to a target host, causing a buffer overflow in the CSeq field. The exploit is written in Perl and uses the IO::Socket module. The payload consists of a sequence of 'A' characters ('0x41' in hex) as the return address (EIP).
Mitigation:
Apply the latest patch or update for sipXtapi. Use input validation and boundary checking to prevent buffer overflow vulnerabilities.