- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3091-1 [email protected] https://www.debian.org/lts/security/ Abhijith PA September 02, 2022 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : sofia-sip Version : 1.12.11+20110422.1-2.1+deb10u1 CVE ID : CVE-2022-31001 CVE-2022-31002 CVE-2022-31003 The following vulnerabilities have been discovered in the sofia-sip, a SIP user-agent library. CVE-2022-31001 An attacker can send a message with evil sdp to FreeSWITCH, which will make `n` bigger and trigger out-of-bound access and may cause crash CVE-2022-31002 An attacker can send a message with evil sdp to FreeSWITCH, which may cause crash.This type of crash is caused by url ending with %, the craft message looks like this. CVE-2022-31003 When parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. For Debian 10 buster, these problems have been fixed in version 1.12.11+20110422.1-2.1+deb10u1. We recommend that you upgrade your sofia-sip packages. For the detailed security status of sofia-sip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sofia-sip Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS