Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-14767

Опубликовано: 31 июл. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

5.2.1-1
disco

not-affected

5.2.1-1
eoan

not-affected

5.2.1-1
esm-apps/bionic

released

5.1.2-1ubuntu2+esm2
esm-apps/focal

not-affected

5.2.1-1
esm-apps/jammy

not-affected

5.2.1-1
esm-apps/noble

not-affected

5.2.1-1
esm-apps/xenial

released

4.3.4-1.1ubuntu2.1+esm2

Показывать по

EPSS

Процентиль: 79%
0.01209
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

CVSS3: 9.8
debian
больше 7 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message ...

CVSS3: 9.8
github
больше 3 лет назад

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

EPSS

Процентиль: 79%
0.01209
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3