First published: Fri Sep 07 2018(Updated: )
In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC hash for To tags. (An additional error is present in the check_via_address core function: this function also misses input validation.) This could result in denial of service and potentially the execution of arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Kamailio Kamailio | <5.0.7 | |
Kamailio Kamailio | >=5.1.0<5.1.4 | |
debian/kamailio | 5.2.1-1 5.2.1-1+deb10u1 5.4.4-1 5.6.3-2 5.7.2-1 | |
debian/kamailio | <=4.4.4-2<=4.2.0-2+deb8u3 | 4.4.4-2+deb9u3 5.1.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.