[<prev] [next>] [day] [month] [year] [list]
Message-ID: <12218759274593c1ec8d6960.88723550.Active.mail@poczta.nazwa.pl>
Date: Thu, 28 Dec 2006 14:09:00 +0100
From: sapheal@...k.pl
To: bugtraq@...urityfocus.com
Subject: SMS handling OpenSER remote code executing
Synopsis: SMS handling OpenSER remote code executing
Product: OpenSER
Version: <=1.1.0
Issue:
======
A critical security vulnerability has been found in OpenSER SMS
handling module. The vulnerable function should read the SMS
from the SIM-memory.
Details:
========
int fetchsms(struct modem *mdm, int sim, char* pdu)
The usage of this fuction might lead to memory corruption
conditions. Due to memory corruption conditions remote
code execution is possible. It happens when "beginning"
is copied to functions argument PDU (char*).
Affected Versions
=================
OpenSER <= 1.1.0
Solution
=========
Proper boundary checking.
Exploitation
============
Exploitation might be conducted by preparing a specially
crafted SMS message.
Powered by blists - more mailing lists