Vulnerabilities > CVE-2006-0189 - Remote Buffer Overflow vulnerability in Estara Softphone 3.0.1.14/3.0.1.46

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
estara
nessus
exploit available

Summary

Buffer overflow in eStara Softphone 3.0.1.14 through 3.0.1.46 allows remote attackers to execute arbitrary code via a long attribute (aka "a") field in the SDP data of a SIP packet on UDP port 5060. This is the vendor provided solution: "eStara has released Softphone version 3.0.1.47 to resolve the buffer overflow demonstrated in parsing SDP with long "a=" lines. Licensed customers can download a new version via the email sent to them with purchase, customers testing may go back to http://www.estara.com/softphone/ to obtain a new free trial. Version information can be gathered by going to Help->About. eStara highly recommends all customers upgrade to avoid this issue. If there's further questions please email us: [email protected]. eStara would like to thank ZwelL for bringing the issue to our attention."

Vulnerable Configurations

Part Description Count
Application
Estara
2

Exploit-Db

descriptioneStara Softphone <= 3.0.1.46 (SIP) Remote Buffer Overflow Exploit. CVE-2006-0189. Remote exploit for windows platform
idEDB-ID:1413
last seen2016-01-31
modified2006-01-12
published2006-01-12
reporterZwelL
sourcehttps://www.exploit-db.com/download/1413/
titleeStara Softphone <= 3.0.1.46 SIP Remote Buffer Overflow Exploit

Nessus

NASL familyMisc.
NASL idESTARA_SOFTPHONE_30147.NASL
descriptionThe version of SoftPhone installed on the remote host reportedly fails to properly handle SIP packets with long
last seen2020-06-01
modified2020-06-02
plugin id20958
published2006-02-22
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20958
titleeStara SoftPhone SIP Packet SDP Data attribute Field Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(20958);
  script_version("1.12");
  script_cvs_date("Date: 2018/11/15 20:50:23");

  script_cve_id("CVE-2006-0189");
  script_bugtraq_id(16213);

  script_name(english:"eStara SoftPhone SIP Packet SDP Data attribute Field Overflow");
  script_summary(english:"Checks version number of eStara SoftPhone");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote SIP client is prone to a buffer overflow attack." );
  script_set_attribute(attribute:"description", value:
"The version of SoftPhone installed on the remote host reportedly fails
to properly handle SIP packets with long 'a=' lines in the SDP data. 
An unauthenticated, remote attacker may be able to exploit this flaw to
overflow a buffer and execute arbitrary code on the remote host." );
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/archive/1/421596/100/0/threaded" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to eStara SoftPhone version 3.0.1.47 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/22");
  script_set_attribute(attribute:"vuln_publication_date", value: "2006/01/11");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("estara_softphone_installed.nasl");
  script_require_keys("SMB/SoftPhone/Version");

  exit(0);
}


include("smb_func.inc");


ver = get_kb_item("SMB/SoftPhone/Version");
if (ver) {
  iver = split(ver, sep:'.', keep:FALSE);
  # Check whether it's an affected version.
  if (
    int(iver[0]) < 3 ||
    (
      int(iver[0]) == 3 && 
      int(iver[1]) == 0 &&
      (
        int(iver[2]) < 1 ||
        (int(iver[2]) == 1 && int(iver[3]) < 47)
      )
    )
  ) security_hole(kb_smb_transport());
}