Asterisk
  1. Asterisk
  2. ASTERISK-19770

Security Vulnerability: Segmentation fault when receiving an out-of-dialogue SIP UPDATE including a rpid info

    Details

    • Frequency of Occurrence:
      One Time

      Description

      If a '(for any reason) misdirected' SIP Update including a rpid info is received outside of a regular SIP Invite dialogue (and no associated channel is available, p->owner = NULL) a segmentation fault arises.
      A NULL-pointer check for p->owner is missing in function handle_request_update().

      Please see attached backtrace log and the attached related chan_sip.c module (since the used chan_sip.c is not exactly the mentioned affected version).

      1. ASTERISK-19278-2012-04-16.diff
        0.5 kB
        Matt Jordan
      2. backtrace.log
        8 kB
        Matt Jordan

        Issue Links

        No reviews matched the request. Check your Options in the drop-down menu of this sections header.

          Activity

          There are no comments yet on this issue.

            People

            • Watchers:
              0 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: