Vulnerability Details : CVE-2023-28098
OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header causes OpenSIPS to crash or behave in an unexpected way due to a bug in the function `parse_param_name()` . This issue was discovered while performing coverage guided fuzzing of the function parse_msg. The AddressSanitizer identified that the issue occurred in the function `q_memchr()` which is being called by the function `parse_param_name()`. This issue may cause erratic program behaviour or a server crash. It affects configurations containing functions that make use of the affected code, such as the function `www_authorize()` . Versions 3.1.7 and 3.2.4 contain a fix.
Vulnerability category: Input validation
Products affected by CVE-2023-28098
- cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*
- cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28098
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28098
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-28098
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2023-28098
-
https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
Third Party Advisory
-
https://github.com/OpenSIPS/opensips/security/advisories/GHSA-jrqg-vppj-hr2h
Vulnerability in the Digest Authentication Parser · Advisory · OpenSIPS/opensips · GitHubThird Party Advisory
-
https://github.com/OpenSIPS/opensips/commit/dd9141b6f67d7df4072f3430f628d4b73df5e102
parse_param_name(): Improve param parsing macros · OpenSIPS/opensips@dd9141b · GitHubPatch;Third Party Advisory
Jump to