Home

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-17 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-476: NULL Pointer Dereference

CWE-755: Improper Handling of Exceptional Conditions

Product status

>= v0.3.0, < v1.0.0-alpha-1
affected

References

github.com/.../sipgo/security/advisories/GHSA-c623-f998-8hhv

github.com/...ommit/dc9669364a154ec6d134e542f6a63c31b5afe6e8

cve.org (CVE-2025-68274)

nvd.nist.gov (CVE-2025-68274)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.