If someone is using this function towards phones and the phone responds with a
crafted 302 - which is now in the wild - we will crash if this module
and function is used - regardless of how old the code is. A crash is a crash.
In a situation a message sent as a response will cause Kamailio to crash.
That's no good.
Even if we hope that there is no one using it this way, we can't know.
In my view, this is clearly a security issue.
So there is no risk of being hit by
malicious/unknown attackers from the
wild.
I don't agree with this assesment. We are allowed to have different
views :-)
Note that this is propably the first time I have seen this kind of issue with
Kamailio...
I propably have to add conflict resolution to my security vulnerability proposal ;-)
/O
>
> Cheers,
> Daniel
>
> On 05/02/15 15:36, Olle E. Johansson wrote:
>> Friends,
>>
>> I think today's issue with a 302 message sent to kamailio causing a crash is
a security issue. It was dealt with swiftly, but I feel we need a more formal procedure
for handling it, producing patches and releasing security information.
>>
>> I've made a quick proposal that outlines a few simple things and policys. We
should make it too complex, but I feel it's important for all our users that a project
has some procedure on how to handle situations like this.
>>
>> Please check the proposal in the dev meeting agenda and let's discuss it in
the dev meeting.
>>
>>
http://www.kamailio.org/wiki/devel/irc-meetings/2015a
>>
>> /O
>> _______________________________________________
>> sr-dev mailing list
>> sr-dev(a)lists.sip-router.org
>>
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
> --
> Daniel-Constantin Mierla
>
http://twitter.com/#!/miconda -
http://www.linkedin.com/in/miconda
> Kamailio World Conference, May 27-29, 2015
> Berlin, Germany -
http://www.kamailioworld.com
>
>
> _______________________________________________
> sr-dev mailing list
> sr-dev(a)lists.sip-router.org
>
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev