CVE-2020-28361

NameCVE-2020-28361
DescriptionKamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module. Particular use of remove_hf in Sippy Softswitch may allow skilled attacker having a valid credential in the system to disrupt internal call start/duration accounting mechanisms leading potentially to a loss of revenue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)stretch, stretch (security)4.4.4-2+deb9u3vulnerable
buster5.2.1-1vulnerable
bullseye, sid5.4.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosource(unstable)5.4.0-1

Notes

[buster] - kamailio <no-dsa> (Minor issue)
[stretch] - kamailio <no-dsa> (Minor issue)
https://packetstormsecurity.com/files/159030/Kamailio-5.4.0-Header-Smuggling.html

Search for package or bug name: Reporting problems