Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16671

Опубликовано: 09 нояб. 2017
Источник: debian

Описание

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:13.18.1~dfsg-1package
asteriskfixed1:13.14.1~dfsg-2+deb9u3stretchpackage
asterisknot-affectedjessiepackage
asterisknot-affectedwheezypackage

Примечания

  • http://downloads.digium.com/pub/security/AST-2017-010.html

  • http://downloads.asterisk.org/pub/security/AST-2017-010-13.diff

  • https://issues.asterisk.org/jira/browse/ASTERISK-27337

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer.

CVSS3: 8.8
nvd
около 8 лет назад

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer.

CVSS3: 8.8
github
больше 3 лет назад

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer.