Advisory Details

June 10th, 2008

AOL AIM SIPFoundry sipXtapi RTP Processing Heap Overflow Vulnerability

ZDI-08-098
ZDI-CAN-279

CVE ID
CVSS SCORE
AFFECTED VENDORS America Online
AFFECTED PRODUCTS AIM
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['6024']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of any communication application utilizing the SIP Foundry API. This includes vendors such as AOL, Yahoo, Skype, Oracle, Nortel and more. Authentication is not required to exploit these vulnerabilities, however a user must have a voice session active to expose the flaw.

The specific flaw exists when parsing RTP information destined for the target client. When the value for the RTP header value "Extension Length" is improperly used a heap overflow occurs. Proper exploitation can lead to remote compromise of the system under the credentials of the logged in user.

ADDITIONAL DETAILS

Fixed in AIM 6.8 client, version 6.8.7.7.


DISCLOSURE TIMELINE
  • 2008-01-21 - Vulnerability reported to vendor
  • 2008-06-10 - Coordinated public release of advisory
CREDIT wushi of team509
BACK TO ADVISORIES