http://bugzilla.opensuse.org/show_bug.cgi?id=1200117
Bug ID: 1200117 Summary: VUL-0: CVE-2022-31002: out of bounds read via malformed URL Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other URL: https://smash.suse.de/issue/333252/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: os.gnome.maintainers@gmail.com Reporter: carlos.lopez@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: ---
CVE-2022-31002
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31002 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31002 https://github.com/freeswitch/sofia-sip/commit/51841eb53679434a386fb2dcbca92... https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-g3x6-p824-x...
http://bugzilla.opensuse.org/show_bug.cgi?id=1200117
Carlos L�pez carlos.lopez@suse.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|VUL-0: CVE-2022-31002: out |VUL-0: CVE-2022-31002: |of bounds read via |sofia-sip: out of bounds |malformed URL |read via malformed URL
http://bugzilla.opensuse.org/show_bug.cgi?id=1200117 http://bugzilla.opensuse.org/show_bug.cgi?id=1200117#c1
--- Comment #1 from Carlos L�pez carlos.lopez@suse.com --- Affected: - openSUSE:Factory - openSUSE:Backports:SLE-15-SP4 - openSUSE:Backports:SLE-15-SP3