CVE-2018-14767

NameCVE-2018-14767
DescriptionIn Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1471-1, DSA-4267-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)jessie4.2.0-2+deb8u3vulnerable
jessie (security)4.2.0-2+deb8u5fixed
stretch4.4.4-2+deb9u1vulnerable
stretch (security)4.4.4-2+deb9u3fixed
buster5.1.5-1fixed
sid5.1.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosource(unstable)5.1.4-1high
kamailiosourcejessie4.2.0-2+deb8u4highDLA-1471-1
kamailiosourcestretch4.4.4-2+deb9u2highDSA-4267-1

Notes

https://skalatan.de/blog/advisory-hw-2018-05
https://www.kamailio.org/w/2018/07/kamailio-security-announcement-for-kamailio-core/
https://github.com/kamailio/kamailio/commit/281a6c6b6eaaf30058b603325e8ded20b99e1456

Search for package or bug name: Reporting problems