Heap-based buffer overflow in the encode_msg function in encode_msg.c in the SEAS module in Kamailio (formerly OpenSER and SER) before 4.3.5 allows remote attackers to cause a denial of service (memory corruption and process crash) or possibly execute arbitrary code via a large SIP packet.
References
Configurations
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html - Exploit | |
References | () http://www.debian.org/security/2016/dsa-3535 - | |
References | () http://www.debian.org/security/2016/dsa-3537 - | |
References | () http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog - | |
References | () http://www.securityfocus.com/archive/1/537926/100/0/threaded - | |
References | () https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/ - Exploit | |
References | () https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643 - Exploit | |
References | () https://www.exploit-db.com/exploits/39638/ - Exploit |
Information
Published : 2016-04-11 15:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2385
Mitre link : CVE-2016-2385
CVE.ORG link : CVE-2016-2385
JSON object : View
Products Affected
debian
- debian_linux
kamailio
- kamailio
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer