Home page logo
/

bugtraq logo Bugtraq mailing list archives

OpenSER 1.1.0 parse_config buffer overflow vulnerability
From: sapheal () hack pl
Date: 20 Dec 2006 23:32:48 -0000

Function of a prototype:
static int parse_expression(char *str, expression **e, expression **e_exceptions) 

in OpenSER 1.1.0 (SIP router implementation) is vulnerable to buffer overflow as /str/ might be longer than the 
destination (where it is coppied to).


  By Date           By Thread  

Current thread:
  • OpenSER 1.1.0 parse_config buffer overflow vulnerability sapheal (Dec 21)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault