[Devel] [ openser-Bugs-1627131 ] OSP module potential buffer overflow issue

SourceForge.net noreply at sourceforge.net
Wed Jan 3 17:46:49 CET 2007


Bugs item #1627131, was opened at 2007-01-03 11:45
Message generated for change (Comment added) made by di-shi
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=743020&aid=1627131&group_id=139143

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: modules
Group: None
>Status: Closed
Resolution: None
Priority: 5
Private: No
Submitted By: Di-Shi Sun (di-shi)
>Assigned to: Di-Shi Sun (di-shi)
Summary: OSP module potential buffer overflow issue

Initial Comment:
Synopsis: OpenSER OSP Module remote code execution
Product: OpenSER
Version: <=1.1.0
Issue:
======
A critical security vulnerability has been found in OpenSER Open
Settlement Protocol (OSP) module. OSP is an ETSI defined standard
for Inter-Domain VoIP pricing,authorization and usage exchange.
Details:
========
int validateospheader (struct sip_msg* msg, char* ignore1, char* ignore2)
This following fuction suffers from buffer overflow vulnerability, which
leads to memory corruption conditions. Due to memory corruption conditions
remote code execution is possible.
Affected Versions
=================
OpenSER <= 1.1.0

This reporting issue is forward by Bastian Friedrich.

----------------------------------------------------------------------

>Comment By: Di-Shi Sun (di-shi)
Date: 2007-01-03 11:46

Message:
Logged In: YES 
user_id=1470964
Originator: YES

This issue is fixed and committed in both 1.1.x and MAIN HEAD on 1/2/07.

----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=743020&aid=1627131&group_id=139143



More information about the Devel mailing list