From 4dbb7932ca30ee61ea79ecd921d6d61ab2b9673a Mon Sep 17 00:00:00 2001 From: Steve Wills Date: Wed, 11 Oct 2017 18:30:51 +0000 Subject: [PATCH] Document libosip2 issue --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1206bc754ea1..f6308b403f4d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,33 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + osip -- Improper Restriction of Operations within the Bounds of a Memory Buffer + + + libosip2 + 5.0.0 + + + + +

osip developers reports:

+
+

In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.

+
+ +
+ + http://www.securityfocus.com/bid/97644 + https://savannah.gnu.org/support/index.php?109265 + CVE-2017-7853 + + + 2017-04-13 + 2017-10-11 + +
+ ncurses -- multiple issues