Asterisk
Project Security Advisory -
Product |
Asterisk |
Summary |
Buffer overflow in pjproject header parsing can cause crash in Asterisk |
Nature of Advisory |
Denial of Service |
Susceptibility |
Remote Unauthenticated Sessions |
Severity |
Critical |
Exploits Known |
No |
Reported On |
October 5, 2017 |
Reported By |
Youngsung Kim at LINE Corporation |
Posted On |
|
Last Updated On |
|
Advisory Contact |
gjoseph AT digium DOT com |
CVE Name |
|
Description |
By carefully crafting invalid values in the Cseq and the Via header port, pjproject’s packet parsing code can create strings larger than the buffer allocated to hold them. This will usually cause Asterisk to crash immediately. The packets do not have to be authenticated. |
Resolution |
Stricter validation is now done on strings that represent numeric values before they are converted to intrinsic types. Invalid values now cause packet processing to stop and error messages to be emitted. |
Affected Versions |
||
Product |
Release Series |
|
Asterisk Open Source |
13.x |
All Releases |
Asterisk Open Source |
14.x |
All Releases |
Asterisk Open Source |
15.x |
All Releases |
Certified Asterisk |
13.13 |
All Releases |
|
|
|
Corrected In |
|
Product |
Release |
Asterisk Open Source |
13.18.1, 14.7.1, 15.1.1 |
Certified Asterisk |
13.13-cert7 |
|
|
Patches |
|
SVN URL |
Revision |
http://downloads.asterisk.org/pub/security/ |
Asterisk 13 |
http://downloads.asterisk.org/pub/security/ |
Asterisk 14 |
http://downloads.asterisk.org/pub/security/ |
Asterisk 15 |
http://downloads.asterisk.org/pub/security/ |
Certified Asterisk 13.13 |
Links |
https://issues.asterisk.org/jira/browse/ASTERISK-27319 |
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later
versions; if so, the latest version will be posted at
http://downloads.digium.com/pub/security/ |
Revision History |
||
Date |
Editor |
Revisions Made |
October 25, 2017 |
George Joseph |
Initial Revision |
|
|
|
Asterisk
Project Security Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.