Asterisk
Project Security Advisory - AST-2017-007
Product |
Asterisk |
Summary |
Remote Crash Vulerability in res_pjsip |
Nature of Advisory |
Denial of Service |
Susceptibility |
Remote Unauthenticated Sessions |
Severity |
Moderate |
Exploits Known |
No |
Reported On |
|
Reported By |
Ross Beer |
Posted On |
August 31, 2017 |
Last Updated On |
|
Advisory Contact |
George Joseph <gjoseph AT digium DOT com> |
CVE Name |
CVE-2017-14098 |
Description |
A carefully crafted URI in a From, To or Contact header could cause Asterisk to crash. |
Resolution |
Patched pjsip_message_ip_updater to properly ignore the trigger URI. |
Affected Versions |
||
Product |
Release Series |
|
Asterisk Open Source |
13.15.0 |
|
Asterisk Open Source |
14.4.0 |
|
|
|
|
|
|
|
|
|
|
Corrected In |
|
Product |
Release |
Asterisk Open Source |
13.17.1, 14.6.1 |
|
|
|
|
Patches |
|
SVN URL |
Revision |
http://downloads.asterisk.org/pub/security/AST-2017-007-13.diff |
Asterisk 13 |
http://downloads.asterisk.org/pub/security/AST-2017-007-14.diff |
Asterisk 14 |
Links |
https://issues.asterisk.org/jira/browse/ASTERISK-27152 |
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later
versions; if so, the latest version will be posted at
http://downloads.digium.com/pub/security/ |
Revision History |
||
Date |
Editor |
Revisions Made |
|
George Joseph |
Initial document created |
August 31, 2017 |
Kevin Harwell |
Updated for CVE |
Asterisk
Project Security Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.