CVE-2023-32307
Publication date 26 May 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification. Referring to [GHSA-8599-x7rq-fr54](https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54), several other potential heap-over-flow and integer-overflow in stun_parse_attr_error_code and stun_parse_attr_uint32 were found because the lack of attributes length check when Sofia-SIP handles STUN packets. The previous patch of [GHSA-8599-x7rq-fr54](https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54) fixed the vulnerability when attr_type did not match the enum value, but there are also vulnerabilities in the handling of other valid cases. The OOB read and integer-overflow made by attacker may lead to crash, high consumption of memory or even other more serious consequences. These issue have been addressed in version 1.13.15. Users are advised to upgrade.
Status
Package | Ubuntu Release | Status |
---|---|---|
sip4 | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
sofia-sip | ||
22.04 LTS jammy |
Fixed 1.12.11+20110422.1-2.1+deb10u3ubuntu0.22.04.2
|
|
20.04 LTS focal |
Fixed 1.12.11+20110422.1-2.1+deb10u3ubuntu0.20.04.2
|
|
18.04 LTS bionic |
Fixed 1.12.11+20110422.1-2.1+deb10u3ubuntu0.18.04.1~esm1
|
|
16.04 LTS xenial |
Fixed 1.12.11+20110422.1-2.1+deb10u3ubuntu0.16.04.1~esm2
|
|
14.04 LTS trusty | Ignored end of standard support |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6448-1
- Sofia-SIP vulnerability
- 24 October 2023