Vulnerability Details : CVE-2006-3524

Buffer overflow in SIPfoundry sipXtapi released before 20060324 allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.
Vulnerability category: OverflowExecute code
Published 2006-07-12 00:05:00
Updated 2018-10-18 16:47:48
Source MITRE
View at NVD,   CVE.org
At least one public exploit which can be used to exploit this vulnerability exists!

Exploit prediction scoring system (EPSS) score for CVE-2006-3524

Probability of exploitation activity in the next 30 days: 92.09%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2006-3524

  • SIPfoundry sipXphone 2.6.0.27 CSeq Buffer Overflow
    Disclosure Date : 2006-07-10
    exploit/windows/sip/sipxphone_cseq
    This module exploits a buffer overflow in SIPfoundry's sipXphone 2.6.0.27. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Authors: - MC <[email protected]>
  • AIM Triton 1.0.4 CSeq Buffer Overflow
    Disclosure Date : 2006-07-10
    exploit/windows/sip/aim_triton_cseq
    This module exploits a buffer overflow in AOL\'s AIM Triton 1.0.4. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Authors: - MC <[email protected]>
  • SIPfoundry sipXezPhone 0.35a CSeq Field Overflow
    Disclosure Date : 2006-07-10
    exploit/windows/sip/sipxezphone_cseq
    This module exploits a buffer overflow in SIPfoundry's sipXezPhone version 0.35a. By sending an long CSeq header, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Authors: - MC <[email protected]>

CVSS scores for CVE-2006-3524

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
[email protected]

References for CVE-2006-3524

Products affected by CVE-2006-3524

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!