Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-1959 to the following vulnerability: Stack-based buffer overflow in the get_remote_video_port_media function in call.cpp in SIPp 3.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SIP message. NOTE: some of these details are obtained from third party information. References: http://sourceforge.net/project/shownotes.php?release_id=593806&group_id=104305 http://www.securityfocus.com/bid/28884 http://secunia.com/advisories/29890
This seems to be a relevant upstream commit: http://sipp.svn.sourceforge.net/viewvc/sipp?view=rev&revision=427 However, as noted by Nico Golde in Debian bug report, there are probably other similar issues in get_remote_ip_media() and get_remote_ipv6_media(): http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479039
Peter, I've noticed that size of SRPM jumped from ~200kB to ~9.5Mb between 3.0 and 3.1, because upstream tarball now includes sources for libs sipp depends on. As we probably don't need them on Fedora, would it make sense to remove them from upstream tarball?
sipp-3.1-1.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report.
(In reply to comment #1) > However, as noted by Nico Golde in Debian bug report, there are probably other > similar issues in get_remote_ip_media() and get_remote_ipv6_media(): > > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479039 That issue got CVE-2008-2085 and is now tracked via separate bug bug #446182.
sipp-3.1-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
This issue was addressed in: Fedora: https://admin.fedoraproject.org/updates/F8/FEDORA-2008-3501 https://admin.fedoraproject.org/updates/F9/FEDORA-2008-3690
Reporter changed to security-response-team by request of Jay Turner.