First published: Tue May 31 2022(Updated: )
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sofia-sip | <=1.12.11+20110422.1-2.1 | 1.12.11+20110422.1-2.1+deb10u4 1.12.11+20110422.1-2.1+deb11u2 1.12.11+20110422.1+1e14eea~dfsg-6 |
SignalWire Sofia-SIP | <1.13.8 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31003 is a vulnerability in the Sofia-SIP open-source Session Initiation Protocol (SIP) User-Agent library.
CVE-2022-31003 has a severity rating of 9.8 (Critical).
CVE-2022-31003 allows an attacker to send a malicious sdp message to FreeSWITCH, causing an out-of-bounds write vulnerability in Sofia-SIP.
Sofia-SIP versions up to and including 1.12.11+20110422.1 are affected by CVE-2022-31003.
To fix CVE-2022-31003, it is recommended to upgrade to version 1.13.8 or later of Sofia-SIP.