CVE-2016-10326

NameCVE-2016-10326
DescriptionIn libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-898-1, DSA-3879-1
Debian Bugs860287

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libosip2 (PTS)bullseye4.1.0-2.1fixed
bookworm5.3.0-2.1fixed
sid, trixie5.3.1-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libosip2sourcewheezy3.6.0-4+deb7u1DLA-898-1
libosip2sourcejessie4.1.0-2+deb8u1DSA-3879-1
libosip2source(unstable)4.1.0-2.1860287

Notes

https://savannah.gnu.org/support/index.php?109132
Fixed by: https://git.savannah.gnu.org/cgit/osip.git/commit/?id=b9dd097b5b24f5ee54b0a8739e59641cd51b6ead

Search for package or bug name: Reporting problems