OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, OpenSIPS crashes when a malformed SDP body is sent multiple times to an OpenSIPS configuration that makes use of the stream_process
function. This issue was discovered during coverage guided fuzzing of the function codec_delete_except_re
. By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function codec_delete_except_re
. This issue has been fixed in version 3.1.8 and 3.2.5.
{ "vanir_signatures": [ { "id": "CVE-2023-27596-71671655", "digest": { "line_hashes": [ "269831816298789796622796761134856517880", "6078275837674443026022189296598574833", "221059386863148230943141755643961143447", "260403706925981758466737271790113321016" ], "threshold": 0.9 }, "signature_type": "Line", "deprecated": false, "target": { "file": "modules/sipmsgops/codecs.c" }, "signature_version": "v1", "source": "https://github.com/opensips/opensips/commit/dd051f8ed5ae3347fb1d556ced3c97822c9d8450" }, { "id": "CVE-2023-27596-aa0550bc", "digest": { "length": 6932.0, "function_hash": "178041500925847620274392235412126873250" }, "signature_type": "Function", "deprecated": false, "target": { "file": "modules/sipmsgops/codecs.c", "function": "stream_process" }, "signature_version": "v1", "source": "https://github.com/opensips/opensips/commit/dd051f8ed5ae3347fb1d556ced3c97822c9d8450" } ] }