CVE-2023-27596
HIGHOpensips < 3.1.8 - Resource Allocation Without Limits
Title source: ruleDescription
OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, OpenSIPS crashes when a malformed SDP body is sent multiple times to an OpenSIPS configuration that makes use of the `stream_process` function. This issue was discovered during coverage guided fuzzing of the function `codec_delete_except_re`. By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. This issue has been fixed in version 3.1.8 and 3.2.5.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/OpenSIPS/opensips/security/advisories/GHSA-3ghx-j39m-cw4f
Patch, Third Party Advisory x_refsource_misc
https://github.com/OpenSIPS/opensips/commit/dd051f8ed5ae3347fb1d556ced3c97822c9d8450
Scores
CVSS v3
7.5
EPSS
0.0032
EPSS Percentile
54.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (1)
opensips/opensips
< 3.1.8
Published
Mar 15, 2023
Tracked Since
Feb 18, 2026