Check Point Reference: | CPAI-2008-202 |
Date Published: | 1 Feb 2008 |
Severity: | High |
Last Updated: | Thursday 20 March, 2008 |
Source: | Microsoft Security Bulletin MS06-032 VOIPSEC |
Industry Reference: | CVE-2006-2379 CVE-2007-1594 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier Asterisk before 1.2.17 and 1.4.x before 1.4.2 |
Vulnerability Description | A buffer overflow vulnerability in Microsoft Windows allows remote attackers to execute arbitrary code. The handle_response function in Astersik allows allows remote attackers to cause a denial of service. |
Vulnerability Details | Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing. The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet. The following IPS-1 Protocols and Protocol Subsystems have been updated: DNS (v29) Distributed Denial of Service Agents (v14) Finger (v11) Fingerprint Protocol Subsystem (v10) FTP (v24) LPD/LPrng (v12) MS-RPC (v33) MS SQL (v20) NNTP2 (v10) Policy Settings (v23) Rcommands (v11) RPC (v23) Scanner (v08) Session Initiation Protocol (v10) SNMP (v23) SSH (v19) SSL (v16) Trojans and Remote Administration (v19) WWW 2 (v31) The following protocol groups have undergone documentation and configuration changes: |