CVE-2023-40018

Name
CVE-2023-40018
Description
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.10, FreeSWITCH allows remote users to trigger out of bounds write by offering an ICE candidate with unknown component ID. When an SDP is offered with any ICE candidates with an unknown component ID, FreeSWITCH will make an out of bounds write to its arrays. By abusing this vulnerability, an attacker is able to corrupt FreeSWITCH memory leading to an undefined behavior of the system or a crash of it. Version 1.10.10 contains a patch for this issue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/signalwire/freeswitch/releases/tag/v1.10.10
MISC https://github.com/signalwire/freeswitch/security/advisories/GHSA-7mwp-86fv-hcg3

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:* freeswitch >= None < 1.10.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
freeswitch 3.18-main 1.10.9-r2 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
freeswitch 3.17-main 1.10.8-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
freeswitch 3.16-main 1.10.7-r2 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
freeswitch 3.15-main 1.10.7-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
freeswitch edge-main 1.10.9-r5 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
freeswitch 3.19-main 1.10.9-r5 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable