Advisories ยป MGASA-2017-0170

Updated libosip2 packages fix security vulnerabilities

Publication date: 14 Jun 2017
Modification date: 14 Jun 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-10324 , CVE-2016-10325 , CVE-2016-10326 , CVE-2017-7853

Description

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
heap buffer overflow in the osip_clrncpy() function defined in
osipparser2/osip_port.c (CVE-2016-10324).

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
heap buffer overflow in the _osip_message_to_str() function defined in
osipparser2/osip_message_to_str.c, resulting in a remote DoS
(CVE-2016-10325).

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a
heap buffer overflow in the osip_body_to_str() function defined in
osipparser2/osip_body.c, resulting in a remote DoS (CVE-2016-10326).

In libosip2 in GNU 5.0.0, a malformed SIP message can lead to a heap
buffer overflow in the msg_osip_body_parse() function defined in
osipparser2/osip_message_parse.c, resulting in a remote DoS
(CVE-2017-7853).
                

References

SRPMS

5/core