Description
In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC hash for To tags. (An additional error is present in the check_via_address core function: this function also misses input validation.) This could result in denial of service and potentially the execution of arbitrary code.
Published: 2018-09-07
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1503-1 kamailio security update
Debian DSA Debian DSA DSA-4292-1 kamailio security update
EUVD EUVD EUVD-2018-8459 In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC hash for To tags. (An additional error is present in the check_via_address core function: this function also misses input validation.) This could result in denial of service and potentially the execution of arbitrary code.
Ubuntu USN Ubuntu USN USN-6022-1 Kamailio vulnerabilities
History

No history.

Subscriptions

Debian Debian Linux
Kamailio Kamailio
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T10:32:53.033Z

Reserved: 2018-09-07T00:00:00.000Z

Link: CVE-2018-16657

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-07T14:29:03.397

Modified: 2024-11-21T03:53:09.357

Link: CVE-2018-16657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses