CVE-2017-9372

PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:open_source:13.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.7.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.8.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.8.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.8.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.9.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.12.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.12.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.12.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:13.15.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:open_source:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:open_source:14.4.0:rc1:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*

History

21 Nov 2024, 03:35

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2017-002.txt - Third Party Advisory () http://downloads.asterisk.org/pub/security/AST-2017-002.txt - Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3933 - () http://www.debian.org/security/2017/dsa-3933 -
References () http://www.securityfocus.com/bid/98572 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98572 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038529 - () http://www.securitytracker.com/id/1038529 -
References () https://bugs.debian.org/863901 - Mailing List, Third Party Advisory () https://bugs.debian.org/863901 - Mailing List, Third Party Advisory

Information

Published : 2017-06-02 14:29

Updated : 2024-11-21 03:35


NVD link : CVE-2017-9372

Mitre link : CVE-2017-9372

CVE.ORG link : CVE-2017-9372


JSON object : View

Products Affected

digium

  • open_source
  • certified_asterisk
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer