Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-28098
HistoryMar 15, 2023 - 12:00 a.m.

CVE-2023-28098

2023-03-1500:00:00
ubuntu.com
ubuntu.com
10
opensips
sip server
parse_param_name
bug
function
crash
addresssanitizer
q_memchr
www_authorize
vulnerability
fix
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.0%

OpenSIPS is a Session Initiation Protocol (SIP) server implementation.
Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header
causes OpenSIPS to crash or behave in an unexpected way due to a bug in the
function parse_param_name() . This issue was discovered while performing
coverage guided fuzzing of the function parse_msg. The AddressSanitizer
identified that the issue occurred in the function q_memchr() which is
being called by the function parse_param_name(). This issue may cause
erratic program behaviour or a server crash. It affects configurations
containing functions that make use of the affected code, such as the
function www_authorize() . Versions 3.1.7 and 3.2.4 contain a fix.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchopensips< anyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.0%

Related for UB:CVE-2023-28098