Condorlab

Libosip2 – Heap buffer overflow in Libosip2 allow DoS


Advisory IDRSN-SIP-1548


Vulnerability Information

 

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined inosipparser2/osip_body.c, resulting in a remote DoS.  For more information on the affected versions, CVE-2016-10326 was assigned for this bug.


Release Date

2017-04-13 00:00:00


Solutions

 

 

The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team Condor-Labs.com is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit www.redshiftnetworks.com


External Resources

 

 

The oSIP library

https://savannah.gnu.org/support/index.php?109132

Common Vulnerabilities and Exposures (CVE)

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10326