The Open Phone Abstraction Library (opal), as used by (1) Ekiga prior to 2.0.10 and (2) OpenH323 prior to 2.2.4, allows remote malicious users to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ekiga ekiga |
||
openh323 project openh323 |