CVE-2018-14767

NameCVE-2018-14767
DescriptionIn Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1471-1, DSA-4267-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)buster5.2.1-1fixed
buster (security)5.2.1-1+deb10u1fixed
bullseye5.4.4-1fixed
bookworm5.6.3-2fixed
sid, trixie5.7.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosourcejessie4.2.0-2+deb8u4DLA-1471-1
kamailiosourcestretch4.4.4-2+deb9u2DSA-4267-1
kamailiosource(unstable)5.1.4-1

Notes

https://skalatan.de/blog/advisory-hw-2018-05
https://www.kamailio.org/w/2018/07/kamailio-security-announcement-for-kamailio-core/
https://github.com/kamailio/kamailio/commit/281a6c6b6eaaf30058b603325e8ded20b99e1456

Search for package or bug name: Reporting problems