IAXClient Open Source Library iax_net_read Function Packet Handling Remote Overflow

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote softphone is prone to multiple buffer overflow attacks.

Description :

The remote host appears to be using a VoIP software phone application
that is affected by multiple buffer overflows. With specially crafted
UDP packets, an unauthenticated, remote attacker may be able to
leverage these issues to crash the affected application or to execute
arbitrary code on the remote host subject to the privileges of the
user running it.

See also :

http://www.coresecurity.com/common/showdoc.php?idx=548&idxseccion=10
http://www.securityfocus.com/archive/1/436638/30/0/threaded

Solution :

Obtain to a version of the client application built using a version of
IAXClient from June 6 2006 or later.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.0
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 21684 (iaxclient_truncated_frames_overflow.nasl)

Bugtraq ID: 18307

CVE ID: CVE-2006-2923