Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable. It affects configurations containing functions that make use of the affected code, such as the function `and 3.2.4 contain a fix.Īn attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. This issue may cause erratic program behaviour or a server crash. The AddressSanitizer identified that the issue occurred in the function `q_memchr()` which is being called by the function `parse_param_name()`. This issue was discovered while performing coverage guided fuzzing of the function parse_msg. Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header causes OpenSIPS to crash or behave in an unexpected way due to a bug in the function `parse_param_name()`. OpenSIPS is a Session Initiation Protocol (SIP) server implementation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |