CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
42.3%
OpenSIPS, a Session Initiation Protocol (SIP) server implementation, has a
memory leak starting in the 2.3 branch and priot to versions 3.1.8 and
3.2.5. The memory leak was detected in the function parse_mi_request
while performing coverage-guided fuzzing. This issue can be reproduced by
sending multiple requests of the form {"jsonrpc": "2.0","method": "log_le
. This malformed message was tested against an instance of OpenSIPS
via FIFO transport layer and was found to increase the memory consumption
over time. To abuse this memory leak, attackers need to reach the
management interface (MI) which typically should only be exposed on trusted
interfaces. In cases where the MI is exposed to the internet without
authentication, abuse of this issue will lead to memory exhaustion which
may affect the underlying systemβs availability. No authentication is
typically required to reproduce this issue. On the other hand, memory leaks
may occur in other areas of OpenSIPS where the cJSON library is used for
parsing JSON objects. The issue has been fixed in versions 3.1.8 and 3.2.5.
github.com/OpenSIPS/opensips/commit/417568707520af25ec5c5dd91da18e6db3649dcb
github.com/OpenSIPS/opensips/security/advisories/GHSA-2mg2-g46r-j4qr
launchpad.net/bugs/cve/CVE-2023-28096
nvd.nist.gov/vuln/detail/CVE-2023-28096
opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
security-tracker.debian.org/tracker/CVE-2023-28096
www.cve.org/CVERecord?id=CVE-2023-28096