Condorlab

Libosip2 – Malformed SIP message can lead to a heap buffer overflow in Libosip2


Advisory IDRSN-SIP-1547


Vulnerability Information

 

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to aheap buffer overflow in the _osip_message_to_str() function defined inosipparser2/osip_message_to_str.c, resulting in a remote DoS.  For more information on the affected versions, CVE-2016-10325 was assigned for this bug.


Release Date

2017-04-13 00:00:00


Solutions

 

 

The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team Condor-Labs.com is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit www.redshiftnetworks.com


External Resources

 

The oSIP library

https://savannah.gnu.org/support/index.php?109131

Common Vulnerabilities and Exposures (CVE)

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10325