Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:06 AM

Sipera Identifies VOIP Phone Vulnerabilities

Sipera VIPER Lab disclosed seven threat advisories, and potential solutions, for SIP-based soft phones from AOL, Avaya, MSN, and Nortel

RICHARDSON, Texas -- Sipera VIPER™ Lab, operated by Sipera™ Systems, the leader in pure security for VoIP, mobile and multimedia communications, today disclosed seven threat advisories, and potential solutions, for SIP-based soft phones from AOL®, Avaya, MSN® and Nortel™, and four advisories for Avaya SIP-based hard phones. These threat advisories are in addition to previous VoIP hard phone, WiFi/dual-mode phone and general SIP vulnerabilities published this year by Sipera VIPER Lab. Vulnerabilities are posted at http://www.sipera.com/viper as an educational security service to Sipera’s customers and the general public.

The major threat advisories that affect these VoIP soft phones include:

  • Resource exhaustion and buffer overflow attack vulnerabilities in some AOL Instant Messenger voice clients, which might cause denial of service and may allow a remote attacker to crash the IM and voice client.
  • A buffer overflow vulnerability and a SIP parsing error in Avaya one-X™ Desktop Edition SIP soft phones, potentially allow a remote attacker to partially disable the phone, disconnect it from the server and crash the phone.
  • A resource exhaustion attack vulnerability in some Microsoft® MSN Messenger voice chat clients, which might cause denial of service.
  • A buffer overflow vulnerability and an improper message parsing vulnerability in Nortel Networks PC Client SIP soft phones, which may allow a remote attacker to crash the phone.

    Sipera VIPER Lab also announced additional VoIP hard phone advisories for Avaya 4602SW SIP phones, which are vulnerable to server impersonation, accepting SIP requests from random source IP addresses, open UDP port flooding and RTP port flooding. These vulnerabilities can expose the phones to call hijacking, malicious messaging, denial of service, and voice quality degradation.

    “Soft phones provide great flexibility for communications but are very vulnerable to attacks. These not only pose threats to the VoIP system but also to the computing and network environments,” said Krishna Kurapati, Sipera founder/CTO and head of Sipera VIPER Lab. “Left unaddressed, these vulnerabilities can disrupt critical business and personal voice communications, negating the many advantages to VoIP. Sipera works with its customers and vendors to address these threats before they become a major issue.”

    Sipera Systems

    Comment  | 
    Print  | 
    More Insights
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
PUBLISHED: 2019-12-08
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareNa...
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.