製品・ソフトウェアに関する情報
eStara Softphone におけるバッファオーバーフローの脆弱性
Title eStara Softphone におけるバッファオーバーフローの脆弱性
Summary

eStara Softphone には、バッファオーバーフローの脆弱性が存在します。

Possible impacts 第三者により、任意のコードを実行される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Jan. 13, 2006, midnight
Registration Date March 11, 2014, 5:43 p.m.
Last Update March 11, 2014, 5:43 p.m.
CVSS2.0 : 危険
Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Affected System
estara
softphone 3.0.1.14 から 3.0.1.46
CVE (情報セキュリティ 共通脆弱性識別子)
Change Log
No Changed Details Date of change
0 [2014年03月11日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2006-0189
Summary

Buffer overflow in eStara Softphone 3.0.1.14 through 3.0.1.46 allows remote attackers to execute arbitrary code via a long attribute (aka "a") field in the SDP data of a SIP packet on UDP port 5060.

Summary

This is the vendor provided solution:

"eStara has released Softphone version 3.0.1.47 to resolve the buffer overflow demonstrated in parsing SDP with long "a=" lines. Licensed customers can download a new version via the email sent to them with purchase, customers testing may go back to http://www.estara.com/softphone/ to obtain a new free trial. Version information can be gathered by going to Help->About. eStara highly recommends all customers upgrade to avoid this issue. If there's further questions please email us: softphone@estara.com.

eStara would like to thank ZwelL for bringing the issue to our attention."

Publication Date Jan. 13, 2006, 8:03 p.m.
Registration Date Jan. 29, 2021, 3:29 p.m.
Last Update Oct. 20, 2018, 12:43 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:estara:softphone:3.0.1.14:*:*:*:*:*:*:*
cpe:2.3:a:estara:softphone:3.0.1.46:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List