Vulnerability Details : CVE-2021-33056
Belledonne Belle-sip before 4.5.20, as used in Linphone and other products, can crash via an invalid From header in a SIP message.
Exploit prediction scoring system (EPSS) score for CVE-2021-33056
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 38 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-33056
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2021-33056
-
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33056
-
https://github.com/BelledonneCommunications/belle-sip/compare/4.5.15...4.5.20
Comparing 4.5.15...4.5.20 · BelledonneCommunications/belle-sip · GitHubPatch;Third Party Advisory
-
https://github.com/BelledonneCommunications/belle-sip/commit/116e3eb48fe43ea63eb9f3c4b4b30c48d58d6ff0
Fix crash while receiving some kind of invalid from header. · BelledonneCommunications/belle-sip@116e3eb · GitHubPatch;Third Party Advisory
Products affected by CVE-2021-33056
- cpe:2.3:a:linphone:belle-sip:*:*:*:*:*:*:*:*