Debian DSA-4267-1 : kamailio - security update

critical Nessus Plugin ID 111594

Synopsis

The remote Debian host is missing a security-related update.

Description

Henning Westerholt discovered a flaw related to the To header processing in kamailio, a very fast, dynamic and configurable SIP server. Missing input validation in the build_res_buf_from_sip_req function could result in denial of service and potentially the execution of arbitrary code.

Solution

Upgrade the kamailio packages.

For the stable distribution (stretch), this problem has been fixed in version 4.4.4-2+deb9u2.

See Also

https://security-tracker.debian.org/tracker/source-package/kamailio

https://packages.debian.org/source/stretch/kamailio

https://www.debian.org/security/2018/dsa-4267

Plugin Details

Severity: Critical

ID: 111594

File Name: debian_DSA-4267.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/9/2018

Updated: 8/23/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-14767

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:kamailio, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/8/2018

Reference Information

CVE: CVE-2018-14767

DSA: 4267