Bug Bites VOIP Apps

Users of two popular open-source VOIP applications could come under attack if they don't patch their software quickly, a security researcher said today.
The vulnerability could enable attackers to create buffer overflows in VOIP networks, effectively creating a denial-of-service attack on networks that use the software, according to Core Security Technologies, which discovered the threat.
Asterisk PBX, a widely used open-source application that provides private branch exchange features for VOIP networks, and IAX client, an open-source library that runs VOIP protocols for several IP software phones, are the two systems at risk. The two applications are widely used in small businesses where conventional IP-PBX software is too expensive. But Asterisk also serves as the underlying software for enterprise-level and service-provider products, such as Aspect Software's contact center application and SIPphone's Gizmo Project.
The two applications contain a design flaw in which they fail to check for malformed UDP packets, according to Ivan Arce, CTO at Core Security. "An attacker can easily create a buffer overflow by sending an abundance of packets that are too short," he says.
Get all the details at Dark Reading.
— Tim Wilson, Site Editor, Dark Reading
The vulnerability could enable attackers to create buffer overflows in VOIP networks, effectively creating a denial-of-service attack on networks that use the software, according to Core Security Technologies, which discovered the threat.
Asterisk PBX, a widely used open-source application that provides private branch exchange features for VOIP networks, and IAX client, an open-source library that runs VOIP protocols for several IP software phones, are the two systems at risk. The two applications are widely used in small businesses where conventional IP-PBX software is too expensive. But Asterisk also serves as the underlying software for enterprise-level and service-provider products, such as Aspect Software's contact center application and SIPphone's Gizmo Project.
The two applications contain a design flaw in which they fail to check for malformed UDP packets, according to Ivan Arce, CTO at Core Security. "An attacker can easily create a buffer overflow by sending an abundance of packets that are too short," he says.
Get all the details at Dark Reading.
— Tim Wilson, Site Editor, Dark Reading
FEATURED VIDEO
UPCOMING LIVE EVENTS
June 6-8, 2023, Digital Symposium
June 21, 2023, Digital Symposium
June 22, 2023, Digital symposium
December 6-7, 2023, New York City
UPCOMING WEBINARS
June 14, 2023
How do We Capture the 6G Experience?
June 14, 2023
The Power of Wholesale Order Automation: How New Advancements in Intercarrier Commerce Can Transform Your Business.
June 20, 2023
5G standalone for breakout growth and efficiency
June 21, 2023
Cable Next-Gen Europe Digital Symposium
June 22, 2023
Next-Gen PON Digital Symposium
Webinar Archive
PARTNER PERSPECTIVES - content from our sponsors
Is The Traditional PayTV Provider Being Squeezed Out?
By Terry Doyle for Enghouse Networks
All Partner Perspectives