10
CVSSv2

CVE-2016-2385

Published: 11/04/2016 Updated: 09/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) prior to 4.3.5 allows remote malicious users to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

kamailio kamailio

Vendor Advisories

Debian Bug report logs - #815178 kamailio: CVE-2016-2385: SEAS Module Heap overflow Package: src:kamailio; Maintainer for src:kamailio is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Feb 2016 18:00:15 UTC Severity: grave Tags: fix ...
Stelios Tsampas discovered a buffer overflow in the Kamailio SIP proxy which might result in the execution of arbitrary code For the stable distribution (jessie), this problem has been fixed in version 420-2+deb8u1 For the testing distribution (stretch), this problem has been fixed in version 434-2 For the unstable distribution (sid), this p ...

Exploits

census ID: census-2016-0009 CVE ID: CVE-2016-2385 Affected Products: Kamailio 434 (and possibly previous versions) Class: Heap-based Buffer Overflow (CWE-122) Remote: Yes Discovered by: Stelios Tsampas Kamailio (successor of former OpenSER and SER) is an Open Source SIP Server released under GPL, able to handle thousands of call setups per second ...