CVE-2018-14767

NameCVE-2018-14767
DescriptionIn Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4267-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)jessie (security), jessie4.2.0-2+deb8u3vulnerable
stretch4.4.4-2+deb9u1vulnerable
stretch (security)4.4.4-2+deb9u2fixed
buster, sid5.1.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosource(unstable)5.1.4-1
kamailiosourcestretch4.4.4-2+deb9u2DSA-4267-1

Notes

https://skalatan.de/blog/advisory-hw-2018-05
https://www.kamailio.org/w/2018/07/kamailio-security-announcement-for-kamailio-core/
https://github.com/kamailio/kamailio/commit/281a6c6b6eaaf30058b603325e8ded20b99e1456

Search for package or bug name: Reporting problems