Short Name |
VOIP:SIP:AUDIT:INV-CHARACTER |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
VOIP |
Keywords |
sip invalid character |
Release Date |
2006/08/30 |
Update Number |
1213 |
Supported Platforms |
idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This anomaly triggers when it detects non-printable ASCII characters in the first line of a Session Initiation Protocol (SIP) request or response.
Many vulnerabilities in Ethereal have been disclosed by the vendor. The reported issues are in various protocol dissectors. These issues include: - Buffer-overflow vulnerabilities - Format-string vulnerabilities - NULL-pointer dereference denial-of-service vulnerabilities - Segmentation fault denial-of-service vulnerabilities - Infinite-loop denial-of-service vulnerabilities - Memory exhaustion denial-of-service vulnerabilities - Double-free vulnerabilities - Unspecified denial-of-service vulnerabilities These issues could allow remote attackers to execute arbitrary machine code in the context of the vulnerable application. Attackers could also crash the affected application. Various vulnerabilities affect several versions of Ethereal, from 0.8.14 through to 0.10.10. This BID will be split into individual BIDs for each separate issue. BID 13567 has been created for the DISTCC issue.