TITLE: CounterPath eyeBeam SIP Packet Handling Vulnerability SECUNIA ADVISORY ID: SA18516 VERIFY ADVISORY: http://secunia.com/advisories/18516/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: CounterPath eyeBeam http://secunia.com/product/6889/ DESCRIPTION: ZwelL has reported a vulnerability in CounterPath eyeBeam, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. The vulnerability is caused due to a boundary error when handling malformed SIP packets. This can be exploited to cause heap corruption, which crashes the application and may allow arbitrary code execution via specially crafted SIP packets sent to port 8376/udp. It is not clear in which version the vulnerability was reported. SOLUTION: Only use the product when connected to trusted networks. PROVIDED AND/OR DISCOVERED BY: ZwelL ORIGINAL ADVISORY: http://blog.donews.com/zwell/archive/2006/01/17/698810.aspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------