The Mu Dynamics Research team has found several vulnerabilities stemming from unsafe use of the sscanf C standard library function. Asterisk versions 1.6.1 through 1.6.1.2 are affected.
4b4ca564af6eb635dec77a8869f1db6582e448ddc90620d17fb84789c0b6f227
An IKE_SA_INIT message with a Key Exchange payload containing a large number of NULL values can cause a crash of the IKEv2 charon daemon. The problem is strongSwan dereferences a NULL pointer returned by the mpz_export() function of the GNU Multiprecision Library (GMP). strongSwan versions 4.2.6 and below are affected.
a3597b49066b341935ee93779ea9ca112ab0a8104c7b1a8d4db0e4628d8bde6a
The Mu Security Research team has found that repro SIP proxy/registrar version 1.3.2 suffers from a remote denial of service vulnerability.
91a6d43a2baf5a2b2ed067a279c38f21a6b845cf53483affa1bdf220b1303342
The Mu Security Research team has found two security issues in the SDP parser in Asterisk 1.4.18. One is an invalid write to an attacker-controllable, almost arbitrary memory location and the other is a stack buffer overflow with limited attacker-controllable values.
22b9f55626db7117f3ba9d0b616eac257212d9c93020ffbcecfcfa095604f614
There are multiple vulnerabilities where a maliciously-crafted packet can crash Dibbler version 0.6.0. These include packets with options with large lengths (memory allocation failure via integer overflow), invalid lengths (buffer overread), and malformed IA_NA options in a REBIND message (null pointer dereference).
f2b090fcf8285f4556684e70a8d80dc062ceda4f629aff5c30aed4839cb633a6
Quagga bgpd version 0.99.8 suffers from a remote denial of service vulnerability.
a643fe7b20e97d462b4461df79f25858f310676b357a7736c5fd8f8217bcdf15
A remote heap overflow condition in Real Helix's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of an RTSP command with multiple 'Require' headers. Versions prior to 11.1.4 are affected.
99fbe1a74de2e483e58433d3eafc5f2697345d9fc0f9bf9de2e4664637001ed8
An integer overflow vulnerability exists in the RPC runtime library (libinfo) that handles AUTH_UNIX authentication. By sending maliciously-crafted requests to the any RPC service (portmap, mount, nfs, etc), a remote attacker can trigger the overflow which may lead to arbitrary code execution as the 'daemon' user. Mac OS X versions 10.3.9 and 10.4.9 are affected.
97e5e87dca373f256dac237d93184a10f3eab15b0ae01172cebbd02bfd5db45b
Asterisk crashes when handed an otherwise valid request message but with no URI and no SIP-version in the request-line of the message. Asterisk versions 1.2.15 and 1.4.0, along with prior versions, are affected.
4df0189ab0730598e7eef2261fe6960b91fbe72020bb219fd37a290679ce1e96
A remote stack buffer overflow condition in Asterisk's MGCP implementation could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed AUEP (audit endpoint) response message. A second issue exists in the handling of file names sent to the Record() application which could lead to arbitrary code execution via a format string attack or arbitrary file-overwrite via directory traversal techniques. The impact of this vulnerability is minimal, however, as it requires an administrator to use a client-controlled variable as part of the filename. Asterisk versions 1.0.0 through 1.2.10 are affected.
dbdc141ab5d77885c8dca0d5658fe534d27d30e676035e308e313dba03713a10
Multiple vulnerabilities exist in Linux SCTP 2.6.16 (lksctp) all resulting in kernel panics. The crafted packets must be sent to a listening endpoint in order to exploit these vulnerabilities.
5e0aff6ee62b8c5cbca65ce839330a6b9fde0b8a7294f3986963b2e02876e08e