Vulnerability CVE-2018-14767


Published: 2018-07-31

Description:
In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Kamailio -> Kamailio 
Debian -> Debian linux 

 References:
https://lists.debian.org/debian-lts-announce/2018/08/msg00018.html
https://skalatan.de/blog/advisory-hw-2018-05
https://www.debian.org/security/2018/dsa-4267

Copyright 2024, cxsecurity.com

 

Back to Top