OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, when the function `append_hf` handles a SIP message with a malformed To header, a call to the function `abort()` is performed, resulting in a crash. This is due to the following check in `data_lump.c:399` in the function `anchor_lump`. An attacker abusing this vulnerability will crash OpenSIPS leading to Denial of Service. It affects configurations containing functions that make use of the affected code, such as the function `append_hf`. This issue has been fixed in versions 3.1.7 and 3.2.4.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/OpenSIPS/opensips/security/advisories/GHSA-qvj2-vqrg-f5jx | third party advisory |
https://github.com/OpenSIPS/opensips/commit/cb56694d290530ac308f44b453c18120b1c1109d | third party advisory patch |
https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf | third party advisory |