SMS handling OpenSER remote code executing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Synopsis:  SMS handling OpenSER remote code executing 
Product:   OpenSER
Version:   <=1.1.0



Issue:
======

A critical security vulnerability has been found in OpenSER SMS
handling module. The vulnerable function should read the SMS 
from the SIM-memory.


Details:
========
int fetchsms(struct modem *mdm, int sim, char* pdu)

The usage of this fuction might lead to memory corruption
conditions. Due to memory corruption conditions remote 
code execution is possible. It happens when "beginning"
is copied to functions argument PDU (char*).


Affected Versions
=================

OpenSER <= 1.1.0

Solution
=========

Proper boundary checking.


Exploitation
============

Exploitation might be conducted by preparing a specially 
crafted SMS message.





[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux