{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "3.1.7"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "c4122c9860458616cb438795c3545cd0f6014927"
            }
          ],
          "repo": "https://github.com/opensips/opensips",
          "type": "GIT"
        },
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "3.2.0"
              },
              {
                "fixed": "3.2.4"
              }
            ]
          },
          "events": [
            {
              "introduced": "1e94abe8837fe3511fada132d67a6385d8d099a2"
            },
            {
              "fixed": "50407d34067f0e80765617c3bace78639e380d5a"
            }
          ],
          "repo": "https://github.com/opensips/opensips",
          "type": "GIT"
        }
      ]
    }
  ],
  "aliases": [
    "GHSA-xj5x-g52f-548h"
  ],
  "database_specific": {
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
      "CWE-20"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/27xxx/CVE-2023-27601.json"
  },
  "details": "OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, OpenSIPS crashes when a malformed SDP body is received and is processed by the `delete_sdp_line` function in the sipmsgops module. This issue can be reproduced by calling the function with an SDP body that does not terminate by a line feed (i.e. `\\n`).\n\nThe vulnerability was found while performing black-box fuzzing against an OpenSIPS server running a configuration that made use of the functions `codec_delete_except_re` and `codec_delete_re`. The same issue was also discovered while performing coverage guided fuzzing on the function `codec_delete_except_re`. The crash happens because the function `delete_sdp_line` expects that an SDP line is terminated by a line feed (`\\n`):\n\nBy abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. Due to the sanity check that is performed in the `del_lump` function, exploitation of this issue will generate an `abort` in the lumps processing function, resulting in a Denial of Service. This issue has been fixed in versions 3.1.7 and 3.2.4.",
  "id": "CVE-2023-27601",
  "modified": "2026-04-01T23:09:40.631305249Z",
  "published": "2023-03-15T21:32:56.061Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://opensips.org/docs/modules/3.3.x/sipmsgops.html"
    },
    {
      "type": "WEB",
      "url": "https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/27xxx/CVE-2023-27601.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/OpenSIPS/opensips/security/advisories/GHSA-xj5x-g52f-548h"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27601"
    },
    {
      "type": "FIX",
      "url": "https://github.com/OpenSIPS/opensips/commit/8f87c7c03da55f9c79bd92e67fa2c94b2a7ce5cf"
    }
  ],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "OpenSIPS has vulnerability in the codec_delete_XX() functions"
}