Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices

Cybersecurity researchers on Tuesday disclosed details about a zero-click security vulnerability in the Linphone Session Initiation Protocol (SIP) stack that could be remotely exploited without any action from a victim to crash the SIP client and cause a denial-of-service (DoS) condition.

Tracked as CVE-2021-33056 (CVSS score: 7.5), the issue concerns a NULL pointer dereference vulnerability in the “belle-sip” component, a C-language library used to implement SIP transport, transaction, and dialog layers, with all versions prior to 4.5.20 affected by the flaw. The weakness was discovered and reported by industrial cybersecurity company Claroty.

Linphone is an open-source and cross-platform SIP client with support for voice and video calls, end-to-end encrypted messaging, and audio conference calls, among others. SIP, on the other hand, is a signaling protocol used for initiating, maintaining, and terminating real-time multimedia communication sessions for voice, video, and messaging applications over the internet.

To that end, the remotely exploitable vulnerability can be activated by adding a malicious forward slash (“To (the call recipient), From (initiator of the call), or Diversion (redirect the destination endpoint), resulting in a crash of the SIP client application that uses the belle-sip library to handle and parse SIP messages.

“The underlying bug here is that non-SIP URIs are accepted as valid SIP header values,” Claroty researcher Sharon Brizinov said in a write-up. “Therefore, a generic URI such as a simple single forward slash will be considered a SIP URI. This means that the given URI will not contain a valid SIP scheme (scheme will be NULL), and so when the [string] compare function is called with the non-existent scheme (NULL), a null pointer dereference will be triggered and crash the SIP client.”

It’s worth noting that the flaw is also a zero-click vulnerability as it’s possible to cause the SIP client to crash simply by sending an INVITE SIP request with a specially-crafted From/To/Diversion header. As a consequence, any application that uses belle-sip to analyze SIP messages will be rendered unavailable upon receiving a malicious SIP “call.”

Although the patches are available for the core protocol stack, it’s essential that the updates are applied downstream by vendors that rely on the affected SIP stack in their products.

“Successful exploits targeting IoT vulnerabilities have demonstrated they can provide an effective foothold onto enterprise networks,” Brizinov said. “A flaw in a foundational protocol such as the SIP stack in VoIP phones and applications can be especially troublesome given the scale and reach shown by attacks against numerous other third-party components used by developers in software projects.”

You May Also Like

3 thoughts on “Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices

  1. One thing I’d like to say is always that before purchasing more computer system memory, check out the machine within which it will be installed. When the machine is running Windows XP, for instance, the memory threshold is 3.25GB. Putting in in excess of this would just constitute a new waste. Make certain that one’s mother board can handle the particular upgrade amount, as well. Great blog post.

  2. One thing I’d really like to say is that car insurance canceling is a dreadful experience so if you’re doing the best things being a driver you won’t get one. Lots of people do receive the notice that they are officially dumped by the insurance company they have to fight to get added insurance from a cancellation. Low cost auto insurance rates are frequently hard to get after the cancellation. Having the main reasons pertaining to auto insurance termination can help drivers prevent getting rid of in one of the most critical privileges obtainable. Thanks for the suggestions shared by your blog.

  3. My brother recommended I might like this website. He was entirely right. This post truly made my day. You can not imagine just how much time I had spent for this information! Thanks!

Leave a Reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 30,633 Today
» 30,519 Yesterday
» 119,497 This Week
» 61,152 This Month
» 3,701,297 This Year
» 19,936,392 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions