In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with
a double "To" header and an empty "To" tag causes a segmentation fault and
crash. The reason is missing input validation in the
"build_res_buf_from_sip_req" core function. This could result in denial of
service and potentially the execution of arbitrary code.
Upstream:released (5.1.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):ignored (reached end-of-life)
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan):needs-triage
More Information

Updated: 2019-07-18 17:31:45 UTC (commit 649f8c6455205380e35ed054e9ea734222c716bb)