First published: Tue May 31 2022(Updated: )
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sofia-sip | <=1.12.11+20110422.1-2.1 | 1.12.11+20110422.1-2.1+deb10u4 1.12.11+20110422.1-2.1+deb11u2 1.12.11+20110422.1+1e14eea~dfsg-6 |
SignalWire Sofia-SIP | <1.13.8 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31002 refers to a vulnerability in the Sofia-SIP Session Initiation Protocol (SIP) User-Agent library that allows an attacker to send a malicious message to FreeSWITCH, potentially causing a crash.
The severity of CVE-2022-31002 is high, with a severity value of 7.5.
CVE-2022-31002 can be exploited by sending a message with evil Session Description Protocol (SDP) to FreeSWITCH, leading to a potential crash.
Versions prior to 1.13.8 of Sofia-SIP are affected by CVE-2022-31002.
To fix the CVE-2022-31002 vulnerability in Sofia-SIP, update to version 1.13.8 or later, which contains a patch for this issue.