Signalwire Sofia-Sip vulnerabilities
5 known vulnerabilities affecting signalwire/sofia-sip.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH3
Vulnerabilities
Page 1 of 1
CVE-2023-32307HIGHCVSS 7.5fixed in 1.13.152023-05-26
CVE-2023-32307 [HIGH] CWE-122 CVE-2023-32307: Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification.
R
Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification.
Referring to [GHSA-8599-x7rq-fr54](https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54), several other potential heap-over-flow and integer-overflow in stun_parse_attr_error_code and stun_parse_attr_uint32 were found because t
nvd
CVE-2023-22741CRITICALCVSS 9.8fixed in 1.13.112023-01-19
CVE-2023-22741 [CRITICAL] CWE-120 CVE-2023-22741: Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification. I
Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification. In affected versions Sofia-SIP **lacks both message length and attributes length checks** when it handles STUN packets, leading to controllable heap-over-flow. For example, in stun_parse_attribute(), after we get the attribute's type and length value
nvd
CVE-2022-31003CRITICALCVSS 9.8fixed in 1.13.82022-05-31
CVE-2022-31003 [CRITICAL] CWE-122 CVE-2022-31003: Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as
nvd
CVE-2022-31002HIGHCVSS 7.5fixed in 1.13.82022-05-31
CVE-2022-31002 [HIGH] CWE-125 CVE-2022-31002: Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue.
nvd
CVE-2022-31001HIGHCVSS 7.5fixed in 1.13.82022-05-31
CVE-2022-31001 [HIGH] CWE-125 CVE-2022-31001: Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when
nvd