Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28097
HistoryMar 15, 2023 - 10:03 p.m.

CVE-2023-28097 OpenSIPS has vulnerability in the Content-Length Parser

2023-03-1522:03:41
CWE-190
GitHub_M
www.cve.org
opensips
sip server
vulnerability
content-length
segmentation fault
shared memory
workaround
fix
ram
cve-2023-28097

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

40.3%

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, a malformed SIP message containing a large Content-Length value and a specially crafted Request-URI causes a segmentation fault in OpenSIPS. This issue occurs when a large amount of shared memory using the -m flag was allocated to OpenSIPS, such as 10 GB of RAM. On the test system, this issue occurred when shared memory was set to 2362 or higher. This issue is fixed in versions 3.1.9 and 3.2.6. The only workaround is to guarantee that the Content-Length value of input messages is never larger than 2147483647.

CNA Affected

[
  {
    "vendor": "OpenSIPS",
    "product": "opensips",
    "versions": [
      {
        "version": "< 3.1.9",
        "status": "affected"
      },
      {
        "version": ">= 3.2.0, < 3.2.6",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

40.3%

Related for CVELIST:CVE-2023-28097