UBUNTU-CVE-2023-28095

Source
https://ubuntu.com/security/CVE-2023-28095
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28095.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-28095
Related
Published
2023-03-15T22:15:00Z
Modified
2025-01-13T10:24:19Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Versions prior to 3.1.7 and 3.2.4 have a potential issue in msg_translator.c:2628 which might lead to a server crash. This issue was found while fuzzing the function build_res_buf_from_sip_req but could not be reproduced against a running instance of OpenSIPS. This issue could not be exploited against a running instance of OpenSIPS since no public function was found to make use of this vulnerable code. Even in the case of exploitation through unknown vectors, it is highly unlikely that this issue would lead to anything other than Denial of Service. This issue has been fixed in versions 3.1.7 and 3.2.4.

References

Affected packages

Ubuntu:Pro:18.04:LTS / opensips

Package

Name
opensips
Purl
pkg:deb/ubuntu/opensips@2.2.2-3build4?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.2-3build2
2.2.2-3build3
2.2.2-3build4

Ecosystem specific

{
    "ubuntu_priority": "low"
}