Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14767

Опубликовано: 31 июл. 2018
Источник: debian
EPSS Низкий

Описание

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kamailiofixed5.1.4-1package

Примечания

  • https://skalatan.de/blog/advisory-hw-2018-05

  • https://www.kamailio.org/w/2018/07/kamailio-security-announcement-for-kamailio-core/

  • https://github.com/kamailio/kamailio/commit/281a6c6b6eaaf30058b603325e8ded20b99e1456

EPSS

Процентиль: 79%
0.01209
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

CVSS3: 9.8
nvd
больше 7 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

CVSS3: 9.8
github
больше 3 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

EPSS

Процентиль: 79%
0.01209
Низкий