Denial of Service Vulnerability in Kamailio by Sip Message Manipulation
CVE-2018-14767
9.8CRITICAL
Summary
In versions of Kamailio prior to 5.0.7 and 5.1.x leading up to 5.1.4, a specially crafted SIP message containing a double 'To' header with an empty 'To' tag can trigger a segmentation fault, resulting in a crash of the application. This vulnerability arises from inadequate input validation in the 'build_res_buf_from_sip_req' function, which could potentially lead to service outages and might enable the execution of arbitrary code under certain conditions.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved