You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa kamailio

Sigurnosni nedostatak programskog paketa kamailio

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-4267-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 08, 2018 https://www.debian.org/security/faq
– ————————————————————————-

Package : kamailio
CVE ID : CVE-2018-14767

Henning Westerholt discovered a flaw related to the To header processing
in kamailio, a very fast, dynamic and configurable SIP server. Missing
input validation in the build_res_buf_from_sip_req function could result
in denial of service and potentially the execution of arbitrary code.

For the stable distribution (stretch), this problem has been fixed in
version 4.4.4-2+deb9u2.

We recommend that you upgrade your kamailio packages.

For the detailed security status of kamailio please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/kamailio

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltrTaBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0TNXBAAgXAYyk+Y9DCSh/VL5dIs/4JUHMI66xnZSH9k7haETlMT+6ZhTMm/06wY
Q6O0nvAdP7RaG4/j3CiHgTnp3Z1k4zK1S8NNEbsg6AY+vfappu/6bECY7nSB7ljr
N/ATqLg8Vn5LuLegiGtzC8jvdMn4cDW9bmYCAYWznX/As/23F8ye3v9mlLCwcl28
XIxPBG/1ZC8aqdAveInm2LqRIWpSAIBxOp8S7eICPtYEAOjxZmxytTvrmMAhDvkS
L9IhP/BVV3Td9FTNlLVHkGGuE3aym0uGRHC8WmrbBzALMAIV1Bpu9Cgvy1F/RMaB
qLNsWASjgt/ULwsVo+ZtldA3uN2y6Z1NeGJRSZaQ3EK5qvKgViTpULCqW+CrQl7w
63uUtGOXMVPMc4oCNbHbf8hP0kPHKNPBXuiU09txvgQSNJ07XUg8/cmVUy3whp9C
sRX6o9VEmxfqZJpvX+7l9VzL584DuptOTdH4Y1rcL//7BoJvioqwd2iUh9t2p+in
zysbgwicx8AnQy65iH0AhViJimlktT/g0ygvj3Vxsa49w4MGjB8cEH2CMQCCT7Cy
Q0oiG6hBPePEcb4a1p8BfhwHYmRpx87sxFEdPAjsWB/bz/P5465dWyWAoB1iA/er
2xkQur1NV5A0Vwza2Cy5PdfsM5zKkpiEpHqUhO7DNBd6L5zZ5iU=
=UQT1
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja, zaobilaženje sigurnosnih ograničenja ili...

Close