5
CVSSv2

CVE-2007-4924

Published: 08/10/2007 Updated: 15/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Open Phone Abstraction Library (opal), as used by (1) Ekiga prior to 2.0.10 and (2) OpenH323 prior to 2.2.4, allows remote malicious users to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."

Vulnerable Product Search on Vulmon Subscribe to Product

ekiga ekiga

openh323 project openh323

Vendor Advisories

Debian Bug report logs - #454141 opal: CVE-2007-4924 remote denial of service Package: opal; Maintainer for opal is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Nico Golde <nion@debianorg> Date: Mon, 3 Dec 2007 13:15:01 UTC Severity: grave Tags: patch, security Found in version 22 ...
Jose Miguel Esparza discovered that certain SIP headers were not correctly validated A remote attacker could send a specially crafted packet to an application linked against opal (eg Ekiga) causing it to crash, leading to a denial of service ...

Exploits

#!/usr/bin/env python # # OpenH323 Opal SIP Protocol Remote Denial of Service Vulnerability (CVE-2007-4924) # # opal228_dospy by Jose Miguel Esparza # 2007-10-08 S21sec labs import sys,socket if len(sysargv) != 3: sysexit("Usage: " + sysargv[0] + " target_host target_port\n") target = sysargv[1] targetPort = int(sysargv[2]) malformedReques ...
OpenH323 Opal SIP protocol remote denial of service exploit ...