A memory leak was found in the way SIPcrack 0.2 handled processing of SIP traffic, because a lines array was mismanaged. A remote attacker could potentially use this flaw to crash long-running sipdump network sniffing sessions.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sipcrack | Sipcrack_project | 0.2 (including) | 0.2 (including) |
Sipcrack | Ubuntu | artful | * |
Sipcrack | Ubuntu | bionic | * |
Sipcrack | Ubuntu | cosmic | * |
Sipcrack | Ubuntu | devel | * |
Sipcrack | Ubuntu | disco | * |
Sipcrack | Ubuntu | eoan | * |
Sipcrack | Ubuntu | esm-apps/bionic | * |
Sipcrack | Ubuntu | esm-apps/focal | * |
Sipcrack | Ubuntu | esm-apps/jammy | * |
Sipcrack | Ubuntu | esm-apps/noble | * |
Sipcrack | Ubuntu | esm-apps/xenial | * |
Sipcrack | Ubuntu | focal | * |
Sipcrack | Ubuntu | groovy | * |
Sipcrack | Ubuntu | hirsute | * |
Sipcrack | Ubuntu | impish | * |
Sipcrack | Ubuntu | jammy | * |
Sipcrack | Ubuntu | kinetic | * |
Sipcrack | Ubuntu | lunar | * |
Sipcrack | Ubuntu | mantic | * |
Sipcrack | Ubuntu | noble | * |
Sipcrack | Ubuntu | trusty | * |
Sipcrack | Ubuntu | upstream | * |
Sipcrack | Ubuntu | xenial | * |
Sipcrack | Ubuntu | zesty | * |