7.5
CVSSv3

CVE-2022-31001

Published: 31/05/2022 Updated: 15/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

signalwire sofia-sip

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1016974 sofia-sip: CVE-2022-31001 CVE-2022-31002 CVE-2022-31003 Package: src:sofia-sip; Maintainer for src:sofia-sip is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 10 Aug 2022 20:09:04 UTC Severity: grave Tags: ...
Multiple security issues were discovered in Sofia-SIP, a SIP User-Agent library, which could result in denial of service For the stable distribution (bullseye), these problems have been fixed in version 11211+201104221-21+deb11u1 We recommend that you upgrade your sofia-sip packages For the detailed security status of sofia-sip please refer ...