Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3091-1 sofia-sip security update
Debian DSA Debian DSA DSA-5410-1 sofia-sip
EUVD EUVD EUVD-2022-52710 Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.
Ubuntu USN Ubuntu USN USN-5932-1 Sofia-SIP vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T17:55:56.743Z

Reserved: 2022-05-18T00:00:00.000Z

Link: CVE-2022-31003

cve-icon Vulnrichment

Updated: 2024-08-03T07:03:40.261Z

cve-icon NVD

Status : Modified

Published: 2022-05-31T20:15:07.910

Modified: 2024-11-21T07:03:41.747

Link: CVE-2022-31003

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.