An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Eventually Asterisk can run out of memory and crash.
References
Link | Resource |
---|---|
http://downloads.digium.com/pub/security/AST-2017-011.html | Vendor Advisory |
http://www.securityfocus.com/bid/101765 | Third Party Advisory VDB Entry |
https://issues.asterisk.org/jira/browse/ASTERISK-27345 | Vendor Advisory |
https://security.gentoo.org/glsa/201811-11 | |
https://www.debian.org/security/2017/dsa-4076 | |
http://downloads.digium.com/pub/security/AST-2017-011.html | Vendor Advisory |
http://www.securityfocus.com/bid/101765 | Third Party Advisory VDB Entry |
https://issues.asterisk.org/jira/browse/ASTERISK-27345 | Vendor Advisory |
https://security.gentoo.org/glsa/201811-11 | |
https://www.debian.org/security/2017/dsa-4076 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.digium.com/pub/security/AST-2017-011.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/101765 - Third Party Advisory, VDB Entry | |
References | () https://issues.asterisk.org/jira/browse/ASTERISK-27345 - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201811-11 - | |
References | () https://www.debian.org/security/2017/dsa-4076 - |
Information
Published : 2017-11-09 00:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16672
Mitre link : CVE-2017-16672
CVE.ORG link : CVE-2017-16672
JSON object : View
Products Affected
digium
- asterisk
- certified_asterisk
CWE
CWE-772
Missing Release of Resource after Effective Lifetime