7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
39.3%
OpenSIPS is a Session Initiation Protocol (SIP) server implementation.
Prior to versions 3.1.9 and 3.2.6, a malformed SIP message containing a
large Content-Length value and a specially crafted Request-URI causes a
segmentation fault in OpenSIPS. This issue occurs when a large amount of
shared memory using the -m
flag was allocated to OpenSIPS, such as 10 GB
of RAM. On the test system, this issue occurred when shared memory was set
to 2362
or higher. This issue is fixed in versions 3.1.9 and 3.2.6. The
only workaround is to guarantee that the Content-Length value of input
messages is never larger than 2147483647
.
github.com/OpenSIPS/opensips/commit/7cab422e2fc648f910abba34f3f0dbb3ae171ff5
github.com/OpenSIPS/opensips/security/advisories/GHSA-c6j5-f4h4-2xrq
launchpad.net/bugs/cve/CVE-2023-28097
nvd.nist.gov/vuln/detail/CVE-2023-28097
opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
security-tracker.debian.org/tracker/CVE-2023-28097
www.cve.org/CVERecord?id=CVE-2023-28097
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
39.3%