Bug#860287: libosip2: CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853
Salvatore Bonaccorso
carnil at debian.org
Fri Apr 14 06:05:26 UTC 2017
Source: libosip2
Version: 4.1.0-2
Severity: grave
Tags: upstream security patch
Justification: user security hole
Hi,
the following vulnerabilities were published for libosip2.
CVE-2016-10324[0]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the osip_clrncpy() function defined in
| osipparser2/osip_port.c.
CVE-2016-10325[1]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the _osip_message_to_str() function defined in
| osipparser2/osip_message_to_str.c, resulting in a remote DoS.
CVE-2016-10326[2]:
| In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
| heap buffer overflow in the osip_body_to_str() function defined in
| osipparser2/osip_body.c, resulting in a remote DoS.
CVE-2017-7853[3]:
| In libosip2 in GNU oSIP 5.0.0, a malformed SIP message can lead to a
| heap buffer overflow in the msg_osip_body_parse() function defined in
| osipparser2/osip_message_parse.c, resulting in a remote DoS.
The references to the security-tracker contain both respective
upstream report and fixing commits.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-10324
[1] https://security-tracker.debian.org/tracker/CVE-2016-10325
[2] https://security-tracker.debian.org/tracker/CVE-2016-10326
[3] https://security-tracker.debian.org/tracker/CVE-2017-7853
Regards,
Salvatore
More information about the Pkg-voip-maintainers
mailing list