CVE-2022-47515
- EPSS 0.67%
- Veröffentlicht 18.12.2022 05:15:11
- Zuletzt bearbeitet 17.04.2025 15:15:52
An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.
CVE-2022-47516
- EPSS 0.24%
- Veröffentlicht 18.12.2022 05:15:11
- Zuletzt bearbeitet 17.04.2025 19:15:55
An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self asse...
CVE-2022-47517
- EPSS 0.98%
- Veröffentlicht 18.12.2022 05:15:11
- Zuletzt bearbeitet 17.04.2025 19:15:55
An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an ...
CVE-2022-45909
- EPSS 0.53%
- Veröffentlicht 26.11.2022 03:15:10
- Zuletzt bearbeitet 25.04.2025 20:15:37
drachtio-server before 0.8.19 has a heap-based buffer over-read via a long Request-URI in an INVITE request.
CVE-2022-45473
- EPSS 0.05%
- Veröffentlicht 18.11.2022 18:15:10
- Zuletzt bearbeitet 30.04.2025 15:15:59
In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666.
CVE-2022-45474
- EPSS 0.5%
- Veröffentlicht 18.11.2022 18:15:10
- Zuletzt bearbeitet 29.04.2025 19:15:53
drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request.