Name | CVE-2016-2385 |
Description | Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3535-1 |
Debian Bugs | 815178 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
kamailio (PTS) | jessie, jessie (lts) | 4.2.0-2+deb8u5 | fixed |
| stretch (security), stretch (lts), stretch | 4.4.4-2+deb9u3 | fixed |
| buster | 5.2.1-1 | fixed |
| buster (security) | 5.2.1-1+deb10u1 | fixed |
| bullseye | 5.4.4-1 | fixed |
| bookworm | 5.6.3-2 | fixed |
| sid | 5.7.4-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643
https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/