Vulnerability Details : CVE-2006-3524
Public exploit exists!
Buffer overflow in SIPfoundry sipXtapi released before 20060324 allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-3524
- cpe:2.3:a:sipfoundry:sipxtapi:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3524
92.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-3524
-
SIPfoundry sipXphone 2.6.0.27 CSeq Buffer Overflow
Disclosure Date: 2006-07-10First seen: 2020-04-26exploit/windows/sip/sipxphone_cseqThis module exploits a buffer overflow in SIPfoundry's sipXphone 2.6.0.27. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Autho -
SIPfoundry sipXezPhone 0.35a CSeq Field Overflow
Disclosure Date: 2006-07-10First seen: 2020-04-26exploit/windows/sip/sipxezphone_cseqThis module exploits a buffer overflow in SIPfoundry's sipXezPhone version 0.35a. By sending an long CSeq header, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Auth -
AIM Triton 1.0.4 CSeq Buffer Overflow
Disclosure Date: 2006-07-10First seen: 2020-04-26exploit/windows/sip/aim_triton_cseqThis module exploits a buffer overflow in AOL\'s AIM Triton 1.0.4. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application. Authors: -
CVSS scores for CVE-2006-3524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-3524
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047757.html
-
http://securitytracker.com/id?1016455
-
http://www.securityfocus.com/bid/18906
SIPfoundry SIPXtapi CSeq Processing Remote Buffer-Overflow VulnerabilityExploit
-
http://www.securityfocus.com/archive/1/440135/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27681
-
http://www.securityfocus.com/archive/1/439617/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/2735
Jump to