Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
kamailio | le | 4.3.4 |
packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html
www.debian.org/security/2016/dsa-3535
www.debian.org/security/2016/dsa-3537
www.kamailio.org/pub/kamailio/4.3.5/ChangeLog
www.securityfocus.com/archive/1/537926/100/0/threaded
census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/
github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643
www.exploit-db.com/exploits/39638/