Zoiper < 2.24 SIP INVITE Request Remote DoS

Medium Nessus Network Monitor Plugin ID 5630

Synopsis

The remote host is vulnerable to a denial-of-service attack.

Description

The remote host is running Zoiper, a cross-platform VoIP solution.

Versions of Zoiper earlier than 2.24 Library 5324 are potentially affected by a denial-of-service vulnerability because the application fails to properly handle specially crafted SIP INVITE Requests. An attacker, exploiting this flaw, could potentially crash the affected application.

Solution

Upgrade to Zoiper 2.24 Library 5324 or later.

See Also

http://packetstormsecurity.org/0910-exploits/zoiper_dos.py.txt

Plugin Details

Severity: Medium

ID: 5630

Family: Generic

Published: 2010/08/17

Modified: 2018/09/16

Nessus ID: 48273

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:zoiper:zoiper

Patch Publication Date: 2009/10/14

Vulnerability Publication Date: 2009/10/14

Reference Information

CVE: CVE-2009-3704

BID: 42214