Improper Input Validation Affecting opensips package, versions [,3.1.9)[3.2.0,3.2.6)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-OPENSIPS-3361812
  • published16 Mar 2023
  • disclosed16 Mar 2023
  • creditUnknown

Introduced: 16 Mar 2023

CVE-2023-28099  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade opensips to version 3.1.9, 3.2.6 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation such that if ds_is_in_list() is used with an invalid IP address string (NULL is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash.

Note: All users of ds_is_in_list() without the $si variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not.

CVSS Base Scores

version 3.1