CVE-2018-14767

Published: 31 July 2018

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. This could result in denial of service and potentially the execution of arbitrary code.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
kamailio
Launchpad, Ubuntu, Debian
Upstream
Released (5.1.4-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(5.2.1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(5.2.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needs-triage)