#VU33634 Heap-based buffer overflow in Debian Linux - CVE-2016-2385
Published: April 11, 2016 / Updated: August 4, 2020
Debian Linux
Debian
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5. A remote attacker can use a large SIP packet. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html
- http://www.debian.org/security/2016/dsa-3535
- http://www.debian.org/security/2016/dsa-3537
- http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog
- http://www.securityfocus.com/archive/1/537926/100/0/threaded
- https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/
- https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643
- https://www.exploit-db.com/exploits/39638/