First published: Tue May 31 2022(Updated: )
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sofia-sip | <=1.12.11+20110422.1-2.1 | 1.12.11+20110422.1-2.1+deb10u4 1.12.11+20110422.1-2.1+deb11u2 1.12.11+20110422.1+1e14eea~dfsg-6 |
SignalWire Sofia-SIP | <1.13.8 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31001 is a vulnerability in the Sofia-SIP open-source Session Initiation Protocol (SIP) User-Agent library.
CVE-2022-31001 has a severity level of high, with a severity value of 7.5.
CVE-2022-31001 allows an attacker to send a message with evil SDP to FreeSWITCH, potentially causing a crash.
The affected software for CVE-2022-31001 includes the Sofia-SIP package in Debian Linux versions 10.0, as well as the Signalwire Sofia-sip package up to version 1.13.8.
To fix CVE-2022-31001, users should update to the patched versions of the affected software packages provided by the respective vendors.