Segmentation fault in kamailio (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-14767
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
kamailio (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Segmentation fault

EUVDB-ID: #VU14297

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-14767

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to insufficient input validation in the "build_res_buf_from_sip_req" core function. A remote unauthenticated attacker can supply a specially crafted SIP message with a double "To" header and an empty "To" tag, trigger segmentation fault and cause the service to crash.

Successful exploitation of this vulnerability may also result in remote code execution.

Mitigation

Install update from vendor's website.

Vulnerable software versions

kamailio (Alpine package): 5.0.2-r3

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=3f2220e3c4012726f874dd10ef5a91a4591a13c0
https://git.alpinelinux.org/aports/commit/?id=c487afe0026fbde1285ae139f40f15454bf639a6
https://git.alpinelinux.org/aports/commit/?id=0cd1e0ea9c3b80d05bac61b5bdedb1958f43fd83
https://git.alpinelinux.org/aports/commit/?id=b8d672561f21adfd55fb489323944f289c8462fe
https://git.alpinelinux.org/aports/commit/?id=c99d327ad04b2d81f1b67c64459c92abfebc56c2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###