UBUNTU-CVE-2023-28099

Source
https://ubuntu.com/security/CVE-2023-28099
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-28099.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-28099
Related
Published
2023-03-15T23:15:00Z
Modified
2025-01-13T10:24:19Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, if ds_is_in_list() is used with an invalid IP address string (NULL is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash. All users of ds_is_in_list() without the $si variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not. Fixes will are available starting with the 3.1.9 and 3.2.6 minor releases. There are no known workarounds.

References

Affected packages

Ubuntu:Pro:18.04:LTS / opensips

Package

Name
opensips
Purl
pkg:deb/ubuntu/opensips@2.2.2-3build4?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.2-3build2
2.2.2-3build3
2.2.2-3build4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}