Impact
If ds_is_in_list()
is used with an invalid IP address string (NULL
is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash. All users of ds_is_in_list()
without the $si
variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not.
Patches
Fixed in e2f13d374 and backported down to 3.1
branch. The fixes will be/are available starting with the 3.1.9
and 3.2.6
minor releases.
Workarounds
No
References
#2780
For more information
If you have any questions or comments about this advisory:
Credits
Many thanks to @Cossack9989 for finding and reporting this issue!
Impact
If
ds_is_in_list()
is used with an invalid IP address string (NULL
is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash. All users ofds_is_in_list()
without the$si
variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not.Patches
Fixed in e2f13d374 and backported down to
3.1
branch. The fixes will be/are available starting with the3.1.9
and3.2.6
minor releases.Workarounds
No
References
#2780
For more information
If you have any questions or comments about this advisory:
Credits
Many thanks to @Cossack9989 for finding and reporting this issue!