CVE-2020-28361

NameCVE-2020-28361
DescriptionKamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)buster5.2.1-1vulnerable
buster (security)5.2.1-1+deb10u1vulnerable
bullseye5.4.4-1fixed
bookworm5.6.3-2fixed
sid, trixie5.7.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosource(unstable)5.4.0-1

Notes

[buster] - kamailio <no-dsa> (Minor issue)
[stretch] - kamailio <no-dsa> (Minor issue)
https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html

Search for package or bug name: Reporting problems