Description
In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1471-1 | kamailio security update |
Debian DSA |
DSA-4267-1 | kamailio security update |
EUVD |
EUVD-2018-6653 | In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code. |
Ubuntu USN |
USN-7416-1 | Kamailio vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:38:13.435Z
Reserved: 2018-07-31T00:00:00.000Z
Link: CVE-2018-14767
No data.
Status : Modified
Published: 2018-07-31T06:29:00.227
Modified: 2024-11-21T03:49:44.580
Link: CVE-2018-14767
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN