AOL AIM SIPFoundry sipXtapi RTCP Processing Heap Overflow Vulnerability

ID ZDI-08-097
Type zdi
Reporter wushi of team509
Modified 2008-11-09T00:00:00


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AOL AIM. Successful exploitation requires the victim to accept a Video Messaging session with the attacker.

The specific flaw exists in the SIP protocol implementation library, sipXtapi.dll. If a malformed RTCP sender report packet is sent, a memory corruption occurs due to a signedness error allowing the execution of arbitrary code.