[prev in list] [next in list] [prev in thread] [next in thread] 

List:       sip-implementors
Subject:    [Sip-implementors] [OUSPG#0106 VU#528719]Multiple vulnerabilities in implementations of SIP
From:       Christian Wieser <chwieser () ees2 ! oulu ! fi>
Date:       2003-02-21 16:31:35
Message-ID: 200302211631.h1LGVZ711526 () ee ! oulu ! fi
[Download RAW message or body]

Dear colleagues,

[slightly shortened from CERT/CC advisory]
OUSPG's most recent research focused on a subset of SIP related to the
INVITE messages. By applying the PROTOS c07-sip test suite to
a variety of popular SIP-enabled products, the OUSPG discovered
impacts ranging from unexpected system behavior and denial of services
to remote code execution.

You can get the full advisory from 

  http://www.cert.org/advisories/CA-2003-06.html

and the "PROTOS Test-Suite: c07-sip" can be found at
  
  http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/


We are happy for any feedback!

Best regards,

Christian Wieser
mailto:chwieser@ee.oulu.fi

 

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic