----------------------------------------------------------------------------------
@MSGID: <20230414183145.fetne6c5v65umegt@morty>
a3cb56a5
@REPLYADDR Paulo Flabiano Smorigo
<pfsmorigo@canonical.com>
@REPLYTO 2:5075/128 Paulo Flabiano Smorigo
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<20230414183145.fetne6c5v65umegt@morty>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============4766755113485924996=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: -0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6022-1
April 14, 2023
kamailio vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 ESM
- Ubuntu 18.04 ESM
- Ubuntu 16.04 ESM
Summary:
Kamailio could be made to crash or run programs if it received specially
crafted input.
Software Description:
- kamailio: very fast, dynamic and configurable SIP server
Details:
It was discovered that Kamailio did not properly sanitize SIP messages under
certain circumstances. An attacker could use this vulnerability to cause a
denial of service or possibly execute arbitrary code. This issue only affected
Ubuntu 16.04 ESM and 18.04 ESM. (CVE-2018-16657)
It was discovered that Kamailio did not properly validate INVITE requests
under certain circumstances. An attacker could use this vulnerability to
cause a denial of service or possibly execute arbitrary code. (CVE-2020-27507)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 ESM:
kamailio 5.3.2-1ubuntu0.1~esm1
Ubuntu 18.04 ESM:
kamailio 5.1.2-1ubuntu2+esm1
Ubuntu 16.04 ESM:
kamailio 4.3.4-1.1ubuntu2.1+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6022-1
CVE-2018-16657, CVE-2020-27507
--- mail (GNU Mailutils 3.4)
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441