CVE-2018-14767
Summary
| CVE | CVE-2018-14767 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-31 06:29:00 UTC |
| Updated | 2018-10-04 21:29:00 UTC |
| Description | In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Debian -- Security Information -- DSA-4267-1 kamailio |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Advisory HW-2018-05 | skalatan.de |
MISC |
skalatan.de |
Exploit, Patch, Third Party Advisory |
| [SECURITY] [DLA 1471-1] kamailio security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500272 Alpine Linux Security Update for kamailio
- 504036 Alpine Linux Security Update for kamailio