Bug 2162580 (CVE-2023-22741) - CVE-2023-22741 sofia-sip: heap-over-flow in stun_parse_attribute
Summary: CVE-2023-22741 sofia-sip: heap-over-flow in stun_parse_attribute
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2023-22741
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2162581
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-01-20 03:58 UTC by Avinash Hanwate
Modified: 2023-01-22 19:52 UTC (History)
0 users

Fixed In Version: sofia-sip 1.13.11
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-01-22 19:52:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-01-20 03:58:15 UTC
Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification. In affected versions Sofia-SIP **lacks both message length and attributes length checks** when it handles STUN packets, leading to controllable heap-over-flow. For example, in stun_parse_attribute(), after we get the attribute's type and length value, the length will be used directly to copy from the heap, regardless of the message's left size. Since network users control the overflowed length, and the data is written to heap chunks later, attackers may achieve remote code execution by heap grooming or other exploitation methods. The bug was introduced 16 years ago in sofia-sip 1.12.4 (plus some patches through 12/21/2006) to in tree libs with git-svn-id: http://svn.freeswitch.org/svn/freeswitch/trunk@3774 d0543943-73ff-0310-b7d9-9358b9ac24b2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

https://github.com/freeswitch/sofia-sip/commit/da53e4fbcb138b080a75576dd49c1fff2ada2764
https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54

Comment 1 Avinash Hanwate 2023-01-20 03:58:37 UTC
Created sofia-sip tracking bugs for this issue:

Affects: fedora-all [bug 2162581]

Comment 2 Product Security DevOps Team 2023-01-22 19:52:08 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.