Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (VoIP/Phone/FAX)  >   MultiVOIP Vendors:   Multi-Tech Systems
MultiVOIP Buffer Overflow in Processing INVITE Packet May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015314
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 6 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to x.08
Description:   A vulnerability was reported in MultiVOIP. A remote user may be able to execute arbitrary code on the target system.

A remote user can send a SIP packet with a specially crafted INVITE field that is longer than 60 characters to trigger a buffer overflow. As a result, it may be possible to execute arbitrary code on the gateway.

SecurityLab technologies discovered this vulnerability.

Impact:   A remote user may be able to execute arbitrary code on the target device.
Solution:   The vendor has issued a fixed version (x.08).
Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] Buffer Overflow in MultiTech VoIP Implementations

The MultiVOIP voice over IP gateway provides toll-free voice and fax
communications over the Internet or Intranet. Occasionally MultiTech
develops and licenses their VoIP Gateways and VoIP related stacks for
inclusion in third party platforms. Therefore, this bug may affect
products outside of the MultiTech line.

SecurityLab technologies has discovered a remote buffer overflow in
MultiTech's MultiVOIP product line that may lead to remote code 

The buffer overflow occurs in the SIP packet INVITE field with a
string greater than 60 characters. Testing was performed on an
embedded device with limited debug environment. Source code was not
avaible for further analysys.

Vendor Response:
Patched. Version x.08

Contact vendor for current release.

Site of the day:
security news for security professionals

Copyright 2005 SecurityLab Technologies, Inc. You may distribute freely
without modification.

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC