CVE-2023-27599

Source
https://cve.org/CVERecord?id=CVE-2023-27599
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27599.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-27599
Aliases
  • GHSA-qvj2-vqrg-f5jx
Downstream
Published
2023-03-15T20:58:06.736Z
Modified
2026-04-30T16:49:06.593471Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
OpenSIPS has vulnerability in the parse_to_param() function
Details

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, when the function append_hf handles a SIP message with a malformed To header, a call to the function abort() is performed, resulting in a crash. This is due to the following check in data_lump.c:399 in the function anchor_lump. An attacker abusing this vulnerability will crash OpenSIPS leading to Denial of Service. It affects configurations containing functions that make use of the affected code, such as the function append_hf. This issue has been fixed in versions 3.1.7 and 3.2.4.

Database specific
{
    "cwe_ids": [
        "CWE-20"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/27xxx/CVE-2023-27599.json"
}
References

Affected packages

Git / github.com/opensips/opensips

Affected ranges

Type
GIT
Repo
https://github.com/opensips/opensips
Events
Database specific
{
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ],
    "cpe": "cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.1.7"
        },
        {
            "introduced": "3.2.0"
        },
        {
            "fixed": "3.2.4"
        }
    ]
}

Affected versions

1.*
1.11.0
2.*
2.1-alpha1
2.1-alpha2
2.1-alpha3
2.1-rc1
3.*
3.1.0
3.1.0-beta
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.2.0
3.2.1
3.2.2
3.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27599.json"
vanir_signatures_modified
"2026-04-30T16:49:06Z"
vanir_signatures
[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "103427369402872753158271912790578579023",
                "183409190138354218127238252134215334189",
                "197608051211858435498739421386188147849",
                "77791795686128095295210639413416200426",
                "168251727310713755205629515138178111224",
                "206231595634978616990189578503018161554",
                "12657483260088663827942035407165567455",
                "307359737068084536897580089845294022414"
            ]
        },
        "deprecated": false,
        "signature_version": "v1",
        "source": "https://github.com/opensips/opensips/commit/cb56694d290530ac308f44b453c18120b1c1109d",
        "target": {
            "file": "parser/parse_to.c"
        },
        "id": "CVE-2023-27599-3b8dfbeb",
        "signature_type": "Line"
    },
    {
        "digest": {
            "length": 6113.0,
            "function_hash": "80557817817875367682846696301065227188"
        },
        "deprecated": false,
        "signature_version": "v1",
        "source": "https://github.com/opensips/opensips/commit/cb56694d290530ac308f44b453c18120b1c1109d",
        "target": {
            "file": "parser/parse_to.c",
            "function": "parse_to_param"
        },
        "id": "CVE-2023-27599-a0b05202",
        "signature_type": "Function"
    }
]