Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Drachtio\-Server
(Drachtio)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-11-18 | CVE-2022-45473 | In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666. | Drachtio\-Server | 5.5 | ||
2022-11-18 | CVE-2022-45474 | drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request. | Drachtio\-Server | 9.8 | ||
2022-11-26 | CVE-2022-45909 | drachtio-server before 0.8.19 has a heap-based buffer over-read via a long Request-URI in an INVITE request. | Drachtio\-Server | 9.1 | ||
2022-12-18 | CVE-2022-47515 | An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error. | Drachtio\-Server | 7.5 | ||
2022-12-18 | CVE-2022-47516 | An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion. | Drachtio\-Server | 7.5 | ||
2022-12-18 | CVE-2022-47517 | An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error. | Drachtio\-Server | 7.5 |