Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | N/A |
CWE-ID | CWE-120 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Certified Asterisk Server applications / Conferencing, Collaboration and VoIP solutions Asterisk Open Source Server applications / Conferencing, Collaboration and VoIP solutions |
Vendor | Digium (Linux Support Services) |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU9147
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.
The weakness exists in CDR's set user due to buffer overflow when setting the user field for Party B on a call detail record (CDR). A remote attacker can send large string that is designed to write past the end of the user field storage buffer and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Update Asterisk to version 13.18.1, 14.7.1, 15.1.1.
Update Certified Asterisk to version 13.13-cert7.
Certified Asterisk: 13.13
Asterisk Open Source: 13.0.0 - 15.1.0
CPE2.3http://downloads.asterisk.org/pub/security/AST-2017-010.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9148
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in pjsip session resource due to insufficient handling of session objects. A remote attacker can submit specially crafted session objects for processing, consume excessive resources and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Update Asterisk to version 13.18.1, 14.7.1, 15.1.1.
Update Certified Asterisk to version 13.13-cert7.
Certified Asterisk: 13.13
Asterisk Open Source: 13.0.0 - 15.1.0
CPE2.3http://downloads.asterisk.org/pub/security/AST-2017-011.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9149
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the pjproject component due to improper processing of crafted invalid values in the Cseq and the Via header port. A remote attacker can submit specially crafted invalid values, trigger buffer overflow and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Update Asterisk to version 13.18.1, 14.7.1, 15.1.1.
Update Certified Asterisk to version 13.13-cert7.
Certified Asterisk: 13.13
Asterisk Open Source: 13.0.0 - 15.1.0
CPE2.3http://downloads.asterisk.org/pub/security/AST-2017-009.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.