First published: Tue Oct 11 2022(Updated: )
GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU oSIP | =5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41550 has a medium severity rating due to the potential for integer overflow vulnerabilities.
To fix CVE-2022-41550, update GNU oSIP to version 5.3.1 or later where the vulnerability is patched.
CVE-2022-41550 specifically affects the osip_body_parse_header component in GNU oSIP v5.3.0.
Exploiting CVE-2022-41550 may lead to denial of service or potential arbitrary code execution.
Users and systems utilizing GNU oSIP v5.3.0 are at risk from CVE-2022-41550.