The ConnectionBase::preparseNewBytes function in resip/stack/ConnectionBase.cxx in reSIProcate through 1.10.2 allows remote attackers to cause a denial of service (buffer overflow) or possibly execute arbitrary code when TLS communication is enabled.
References
Link | Resource |
---|---|
https://github.com/resiprocate/resiprocate/commit/2cb291191c93c7c4e371e22cb89805a5b31d6608 | Patch Third Party Advisory |
http://joachimdezutter.webredirect.org/advisory.html | Broken Link |
https://lists.debian.org/debian-lts-announce/2018/07/msg00031.html | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/45174/ | Exploit Patch Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/148856/reSIProcate-1.10.2-Heap-Overflow.html | Exploit Patch Third Party Advisory VDB Entry |
http://seclists.org/bugtraq/2018/Aug/14 | Exploit Mailing List Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00029.html | Mailing List Third Party Advisory |
Information
Published : 2018-07-16 13:29
Updated : 2022-04-18 10:31
NVD link : CVE-2018-12584
Mitre link : CVE-2018-12584
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
resiprocate
- resiprocate