drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Kamailio
| Name: |
Mehrere Probleme in Kamailio |
|
| ID: |
USN-7416-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS |
|
| Datum: |
Mo, 7. April 2025, 06:54 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2016-2385
https://www.cve.org/CVERecord?id=CVE-2020-28361
https://www.cve.org/CVERecord?id=CVE-2018-14767 |
|
| Applikationen: |
Kamailio |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4572307256826972634== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------1wLOdoRBOjfxOrqB8Krkxyw9"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------1wLOdoRBOjfxOrqB8Krkxyw9 Content-Type: multipart/mixed; boundary="------------kgpxBo6sp65jz00Gnhu6SX0J"; protected-headers="v1" From: Bruce Cable <bruce.cable@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <5386f823-7f0a-433e-af67-978f3ad06b67@canonical.com> Subject: [USN-7416-1] Kamailio vulnerabilities
--------------kgpxBo6sp65jz00Gnhu6SX0J Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7416-1 April 07, 2025
kamailio vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Kamailio.
Software Description: - kamailio: very fast, dynamic and configurable SIP server
Details:
Stelios Tsampas discovered that Kamailio did not correctly handle certain memory operations, which could lead to a buffer overflow. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-2385)
Henning Westerholt discovered that Kamailio did not correctly handle duplicated headers, which could lead to a segmentation fault. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-14767)
It was discovered that Kamailio did not correctly handle parsing certain headers containing whitespace characters. An authenticated attacker could possibly use this issue to gain access to unauthorized resources and expose sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-28361)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS kamailio 5.3.2-1ubuntu0.1~esm2 Available with Ubuntu Pro
Ubuntu 18.04 LTS kamailio 5.1.2-1ubuntu2+esm2 Available with Ubuntu Pro
Ubuntu 16.04 LTS kamailio 4.3.4-1.1ubuntu2.1+esm2 Available with Ubuntu Pro
After a standard system update you need to restart Kamailio to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7416-1 CVE-2016-2385, CVE-2018-14767, CVE-2020-28361
--------------kgpxBo6sp65jz00Gnhu6SX0J--
--------------1wLOdoRBOjfxOrqB8Krkxyw9 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsD5BAABCAAjFiEEkd98mdFcnQdP7vQkuGrtzot7pOcFAmfzMhEFAwAAAAAACgkQuGrtzot7pOeO ngv/QM/w1iwQkv6kinQRDal5sQDOlh40EbxEr2CNNxUxH1QVojBHSSzFdA+0Omej31XW33/WrFza U9FRCK1LFtTsK8UhPcqoDiA+TEAJKWa1nCqP4JziLjv/DUGBI5DiAfcbIiNZ2dyzZQCmX5KDN4hL ouYEcHxPX2WwVvzs1B/HMHNk+BSsVG3hJ9vyEDkGE36T9P0BS1sRVm4/Cuuf8xtDCgLEaW8AIF88 8R0w/jZuisBt0hqs3nHRea5ERFu5+YUgUgoPVqH0BbpwI9kRIXCNVV3I40THULYTukm77luU8x4J oNROEgre0OSzOsBZcizHjsnFVxVFJz989G/JRY+t8Lriugj1tFF52eAbS9BTXACwqJltc8SND29I H3kb2M9i3bM5AIxYqR7UnFsBR86EvcjhGhv62mCspiTKKSRBO5mEFduzA/qyptvbp9VEESQj+jGG rGbxrWWBPugYn41fM7bAtteuh+9Tw9G46BA8Mjgdn57opJYamqyKF7LF/peM =a3xZ -----END PGP SIGNATURE-----
--------------1wLOdoRBOjfxOrqB8Krkxyw9--
--===============4572307256826972634== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============4572307256826972634==--
|
|
|
|