CVE-2023-27598

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27598
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27598.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-27598
Aliases
  • GHSA-wxfg-3gwh-rhvx
Downstream
Published
2023-03-15T20:29:49Z
Modified
2025-11-04T20:12:28.883737Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
OpenSIPS has vulnerability in the parse_via() function
Details

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, sending a malformed Via header to OpenSIPS triggers a segmentation fault when the function calc_tag_suffix is called. A specially crafted Via header, which is deemed correct by the parser, will pass uninitialized strings to the function MD5StringArray which leads to the crash. Abuse of this vulnerability leads to Denial of Service due to a crash. Since the uninitialized string points to memory location 0x0, no further exploitation appears to be possible. No special network privileges are required to perform this attack, as long as the OpenSIPS configuration makes use of functions such as sl_send_reply or sl_gen_totag that trigger the vulnerable code. This issue has been fixed in versions 3.1.7 and 3.2.4.

Database specific
{
    "cwe_ids": [
        "CWE-908"
    ]
}
References

Affected packages

Git / github.com/opensips/opensips

Affected ranges

Type
GIT
Repo
https://github.com/opensips/opensips
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.1.7"
        }
    ]
}
Type
GIT
Repo
https://github.com/opensips/opensips
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.2.0"
        },
        {
            "fixed": "3.2.4"
        }
    ]
}

Affected versions

1.*

1.11.0

2.*

2.1-alpha1
2.1-alpha2
2.1-alpha3
2.1-rc1

3.*

3.1.0
3.1.0-beta
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.2.0
3.2.1
3.2.2
3.2.3