A vulnerability has been reported in Nortel IP Softphone 2050, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.
The vulnerability is caused due to boundary errors when processing invalid packets sent to the RTCP port. This can be exploited to cause a buffer overflow and crash the application via specially crafted packets.
Successful exploitation may allow execution of arbitrary code.
Solution: Update to release R2.2 Upgrade Version 264 (see vendor advisory for further details).
Provided and/or discovered by: Daniel Stirnimann and Cyrill Brunschwiler, Compass Security Network Computing AG
Original Advisory: Nortel:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Nortel IP Softphone 2050 Buffer Overflow Vulnerability