Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
BID:25707
Info
Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
| Bugtraq ID: | 25707 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-3286 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 18 2007 12:00AM |
| Updated: | Sep 18 2007 11:20PM |
| Credit: | Kurt Grutzmacher is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Avaya IP Softphone 6.0 Avaya IP Softphone 5.2 Avaya IP Softphone 0 |
| Not Vulnerable: |
Avaya IP Softphone 5.2 SP3 |
Discussion
Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
Multiple Avaya IP Softphone ActiveX controls are prone to multiple buffer-overflow vulnerabilities because the software fails to perform adequate boundary-checks on user-supplied data.
Successfully exploiting these issues will allow an attacker to execute arbitrary code within the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
The vulnerable controls are not marked 'safe for scripting', making remote exploits possible only when used in conjunction with other latent vulnerabilities or when configuration settings allow the affected controls to be remotely executed.
Avaya IP Softphone 5.2 and 6.0 are vulnerable to these issues.
Multiple Avaya IP Softphone ActiveX controls are prone to multiple buffer-overflow vulnerabilities because the software fails to perform adequate boundary-checks on user-supplied data.
Successfully exploiting these issues will allow an attacker to execute arbitrary code within the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
The vulnerable controls are not marked 'safe for scripting', making remote exploits possible only when used in conjunction with other latent vulnerabilities or when configuration settings allow the affected controls to be remotely executed.
Avaya IP Softphone 5.2 and 6.0 are vulnerable to these issues.
Exploit / POC
Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
Currently we are not aware of any working exploits for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Currently we are not aware of any working exploits for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution / Fix
Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
Solution:
The vendor has released an advisory and fixes to address these issues. Please see the referenced advisory for information on obtaining and applying fixes.
Solution:
The vendor has released an advisory and fixes to address these issues. Please see the referenced advisory for information on obtaining and applying fixes.
References
Avaya IP Softphone ActiveX Controls Multiple Buffer Overflow Vulnerabilities
References:
References:
- IP Softphone Home Page (Avaya)
- Microsoft Support Document 240797 (Microsoft)
- ASA-2007-314: Buffer Overflow Vulnerabilities in IP Softphone (Avaya)