Red Hat Bugzilla – Bug 444728
CVE-2008-1959 SIPp stack based buffer overflow in get_remote_video_port_media()
Last modified: 2009-10-23 15:06:57 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-1959 to the following vulnerability:
Stack-based buffer overflow in the get_remote_video_port_media function in call.cpp in SIPp 3.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SIP message. NOTE: some of these details are obtained from third party information.
This seems to be a relevant upstream commit:
However, as noted by Nico Golde in Debian bug report, there are probably other
similar issues in get_remote_ip_media() and get_remote_ipv6_media():
Peter, I've noticed that size of SRPM jumped from ~200kB to ~9.5Mb between 3.0
and 3.1, because upstream tarball now includes sources for libs sipp depends on.
As we probably don't need them on Fedora, would it make sense to remove them
from upstream tarball?
sipp-3.1-1.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report.
(In reply to comment #1)
> However, as noted by Nico Golde in Debian bug report, there are probably other
> similar issues in get_remote_ip_media() and get_remote_ipv6_media():
That issue got CVE-2008-2085 and is now tracked via separate bug bug #446182.
sipp-3.1-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
This issue was addressed in:
Reporter changed to email@example.com by request of Jay Turner.