Zoiper < 2.24 SIP INVITE Request Remote DoS

medium Nessus Network Monitor Plugin ID 5630

Synopsis

The remote host is vulnerable to a denial-of-service attack.

Description

The remote host is running Zoiper, a cross-platform VoIP solution.

Versions of Zoiper earlier than 2.24 Library 5324 are potentially affected by a denial-of-service vulnerability because the application fails to properly handle specially crafted SIP INVITE Requests. An attacker, exploiting this flaw, could potentially crash the affected application.

Solution

Upgrade to Zoiper 2.24 Library 5324 or later.

See Also

http://packetstormsecurity.org/0910-exploits/zoiper_dos.py.txt

Plugin Details

Severity: Medium

ID: 5630

Family: Generic

Published: 8/17/2010

Updated: 3/6/2019

Nessus ID: 48273

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:zoiper:zoiper

Patch Publication Date: 10/14/2009

Vulnerability Publication Date: 10/14/2009

Reference Information

CVE: CVE-2009-3704

BID: 42214