![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-31002 |
Description: | Sofia-SIP is an open-source Session Initiation Protocol (SIP) User- Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.893091 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-31002 https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-g3x6-p824-x6hm Debian Security Information: DSA-5410 (Google Search) https://www.debian.org/security/2023/dsa-5410 https://security.gentoo.org/glsa/202210-18 https://github.com/freeswitch/sofia-sip/commit/51841eb53679434a386fb2dcbca925dcc48d58ba https://github.com/freeswitch/sofia-sip/commit/51841eb53679434a386fb2dcbca925dcc48d58ba https://lists.debian.org/debian-lts-announce/2022/09/msg00001.html |