Computer Security
[EN] securityvulns.ru no-pyccku


SipXtapi SIP library buffer overflow
Published:10.07.2006
Source:
SecurityVulns ID:6354
Type:library
Threat Level:
5/10
Description:Buffer overflow on CSeq field parsing.
Affected:TRITON : Triton 1.0
Original documentdocumentMailinglists, [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton) (10.07.2006)
Files:Remote Buffer Overflow in sipXtapi PoC Exploit
 Exploits remote buffer overflow in sipXtapi
 AIM Triton 1.0.4 (and more) Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod