445
VMScore

CVE-2017-17850

Published: 27/12/2017 Updated: 25/11/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.

Vulnerable Product Search on Vulmon Subscribe to Product

digium asterisk

digium certified asterisk 13.8

digium certified asterisk 13.1.0

Vendor Advisories

Debian Bug report logs - #884345 asterisk: CVE-2017-17664: Remote Crash Vulnerability in RTCP Stack Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 14 Dec 2017 10:18:02 UTC Severity: ...
Debian Bug report logs - #885072 asterisk: CVE-2017-17850: Crash in PJSIP resource when missing a contact header Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 23 Dec 2017 14:03:01 U ...