Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-14767
HistoryJul 31, 2018 - 12:00 a.m.

CVE-2018-14767

2018-07-3100:00:00
ubuntu.com
ubuntu.com
6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.747 High

EPSS

Percentile

98.2%

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with
a double “To” header and an empty “To” tag causes a segmentation fault and
crash. The reason is missing input validation in the
“build_res_buf_from_sip_req” core function. This could result in denial of
service and potentially the execution of arbitrary code.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchkamailio< anyUNKNOWN
ubuntu16.04noarchkamailio< anyUNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.747 High

EPSS

Percentile

98.2%