Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-14767 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
kamailio (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU14297
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-14767
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to insufficient input validation in the "build_res_buf_from_sip_req" core function. A remote unauthenticated attacker can supply a specially crafted SIP message with a double "To" header and an empty "To" tag, trigger segmentation fault and cause the service to crash.
Successful exploitation of this vulnerability may also result in remote code execution.
MitigationInstall update from vendor's website.
Vulnerable software versionskamailio (Alpine package): 5.0.2-r3
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=3f2220e3c4012726f874dd10ef5a91a4591a13c0
https://git.alpinelinux.org/aports/commit/?id=c487afe0026fbde1285ae139f40f15454bf639a6
https://git.alpinelinux.org/aports/commit/?id=0cd1e0ea9c3b80d05bac61b5bdedb1958f43fd83
https://git.alpinelinux.org/aports/commit/?id=b8d672561f21adfd55fb489323944f289c8462fe
https://git.alpinelinux.org/aports/commit/?id=c99d327ad04b2d81f1b67c64459c92abfebc56c2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.