CVE-2017-7853

NameCVE-2017-7853
DescriptionIn libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-898-1, DSA-3879-1
NVD severitymedium (attack range: remote)
Debian Bugs860287

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libosip2 (PTS)wheezy3.6.0-4vulnerable
wheezy (security)3.6.0-4+deb7u1fixed
jessie4.1.0-2vulnerable
jessie (security)4.1.0-2+deb8u1fixed
buster, sid, stretch4.1.0-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libosip2source(unstable)4.1.0-2.1medium860287
libosip2sourcejessie4.1.0-2+deb8u1mediumDSA-3879-1
libosip2sourcewheezy3.6.0-4+deb7u1mediumDLA-898-1

Notes

https://savannah.gnu.org/support/index.php?109265
Fixed by: https://git.savannah.gnu.org/cgit/osip.git/commit/?id=1ae06daf3b2375c34af23083394a6f010be24a45

Search for package or bug name: Reporting problems