Bug#860287: libosip2: CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853

Salvatore Bonaccorso carnil at debian.org
Fri Apr 14 06:05:26 UTC 2017


Source: libosip2
Version: 4.1.0-2
Severity: grave
Tags: upstream security patch
Justification: user security hole

Hi,

the following vulnerabilities were published for libosip2.

CVE-2016-10324[0]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the osip_clrncpy() function defined in
| osipparser2/osip_port.c.

CVE-2016-10325[1]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the _osip_message_to_str() function defined in
| osipparser2/osip_message_to_str.c, resulting in a remote DoS.

CVE-2016-10326[2]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the osip_body_to_str() function defined in
| osipparser2/osip_body.c, resulting in a remote DoS.

CVE-2017-7853[3]:
| In libosip2 in GNU oSIP 5.0.0, a malformed SIP message can lead to a
| heap buffer overflow in the msg_osip_body_parse() function defined in
| osipparser2/osip_message_parse.c, resulting in a remote DoS.

The references to the security-tracker contain both respective
upstream report and fixing commits.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10324
[1] https://security-tracker.debian.org/tracker/CVE-2016-10325
[2] https://security-tracker.debian.org/tracker/CVE-2016-10326
[3] https://security-tracker.debian.org/tracker/CVE-2017-7853

Regards,
Salvatore



More information about the Pkg-voip-maintainers mailing list