Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28098
HistoryMar 15, 2023 - 10:11 p.m.

CVE-2023-28098 OpenSIPS has vulnerability in the Digest Authentication Parser

2023-03-1522:11:01
CWE-20
GitHub_M
www.cve.org
opensips
vulnerability
digest authentication parser
erratic behavior
server crash
fix
coverage guided fuzzing
sip server
addresssanitizer
q_memchr
parse_param_name
www_authorize

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.0%

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header causes OpenSIPS to crash or behave in an unexpected way due to a bug in the function parse_param_name() . This issue was discovered while performing coverage guided fuzzing of the function parse_msg. The AddressSanitizer identified that the issue occurred in the function q_memchr() which is being called by the function parse_param_name(). This issue may cause erratic program behaviour or a server crash. It affects configurations containing
functions that make use of the affected code, such as the function www_authorize() . Versions 3.1.7 and 3.2.4 contain a fix.

CNA Affected

[
  {
    "vendor": "OpenSIPS",
    "product": "opensips",
    "versions": [
      {
        "version": "< 3.1.7",
        "status": "affected"
      },
      {
        "version": ">= 3.2.0, < 3.2.4",
        "status": "affected"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.0%

Related for CVELIST:CVE-2023-28098