An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://github.com/drachtio/drachtio-server/issues/244 | third party advisory exploit |
https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html | mailing list |
https://www.debian.org/security/2023/dsa-5410 | vendor advisory |