An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion.
References
Link | Resource |
---|---|
https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377 | Patch Third Party Advisory |
https://github.com/drachtio/drachtio-server/issues/244 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html | |
https://www.debian.org/security/2023/dsa-5410 | |
https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377 | Patch Third Party Advisory |
https://github.com/drachtio/drachtio-server/issues/244 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html | |
https://www.debian.org/security/2023/dsa-5410 |
Configurations
History
No history.
Information
Published : 2022-12-18 05:15
Updated : 2025-04-17 19:15
NVD link : CVE-2022-47516
Mitre link : CVE-2022-47516
CVE.ORG link : CVE-2022-47516
JSON object : View
Products Affected
drachtio
- drachtio-server
CWE
CWE-617
Reachable Assertion