Remote code execution in Kamailio

Published: 2018-08-09 11:58:09
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2018-14767
CVSSv3 8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-20
Exploitation vector Network
Public exploit Not available
Vulnerable software Kamailio
Vulnerable software versions Kamailio 5.0.0
Kamailio 5.0.3
Kamailio 5.0.6
Show more
Vendor URL Kamailio

Security Advisory

1) Segmentation fault

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to insufficient input validation in the "build_res_buf_from_sip_req" core function. A remote unauthenticated attacker can supply a specially crafted SIP message with a double "To" header and an empty "To" tag, trigger segmentation fault and cause the service to crash.

Successful exploitation of this vulnerability may also result in remote code execution.

Remediation

The vulnerability has been addressed in the versions 5.0.7, 5.1.4.

External links

https://skalatan.de/blog/advisory-hw-2018-05

Back to List