CVE-2018-7284
A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
Published
2018-02-22T00:29:01.000
Last Modified
2024-11-21T04:11:56.303
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://downloads.asterisk.org/pub/security/AST-2018-004.html
Patch, Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/103151
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1040416
Third Party Advisory, VDB Entry
([email protected])
-
https://www.debian.org/security/2018/dsa-4320
Third Party Advisory
([email protected])
-
https://www.exploit-db.com/exploits/44184/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://downloads.asterisk.org/pub/security/AST-2018-004.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/103151
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1040416
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2018/dsa-4320
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/44184/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)