Condorlab

Kamailio – Vulnerability double “To” header


visory IDRSN-SIP-1607



Vulnerability Information

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double “To” header and an empty “To” tag causes a segmentation fault and crash. The reason is missing input validation in the “build_res_buf_from_sip_req” core function. This could result in denial of service and potentially the execution of arbitrary code.


Technical Information

Crafted SIP message with a double “To” header and an empty “To” tag causes a segmentation fault and crash.


Solutions

The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team Condor-Labs.com is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit www.redshiftnetworks.com


External Resources

Common Vulnerabilities and Exposures (CVE)

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14767
https://www.debian.org/security/2018/dsa-4267
https://skalatan.de/blog/advisory-hw-2018-05
https://lists.debian.org/debian-lts-announce/2018/08/msg00018.html