5
CVSSv2

CVE-2017-9372

Published: 02/06/2017 Updated: 05/11/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

PJSIP, as used in Asterisk Open Source 13.x prior to 13.15.1 and 14.x prior to 14.4.1, Certified Asterisk 13.13 prior to 13.13-cert4, and other products, allows remote malicious users to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

digium open source 13.1.0

digium open source 13.5.0

digium open source 13.6.0

digium open source 13.9.0

digium open source 13.14.0

digium open source 13.15.0

digium open source 13.0.0

digium open source 13.4.0

digium open source 13.8.1

digium open source 13.8.2

digium open source 13.12.2

digium open source 13.13.0

digium open source 13.3.0

digium open source 13.8.0

digium open source 13.12.0

digium open source 13.12.1

digium open source 13.2.0

digium open source 13.7.0

digium open source 13.10.0

digium open source 13.11.0

digium open source 14.0.0

digium open source 14.2.1

digium open source 14.3.0

digium open source 14.2.0

digium open source 14.1.0

digium open source 14.4.0

digium certified asterisk 13.13.0

Vendor Advisories

Debian Bug report logs - #863901 pjproject: CVE-2017-9372: AST-2017-002: Buffer Overrun in PJSIP transaction layer Package: src:pjproject; Maintainer for src:pjproject is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Bernhard Schmidt <berni@debianorg> Date: Thu, 1 Jun 2017 19:06:02 UT ...
Two vulnerabilities were found in the PJSIP/PJProject communication library, which may result in denial of service For the oldstable distribution (jessie), these problems have been fixed in version 2100ast20130823-1+deb8u1 For the stable distribution (stretch), these problems had been fixed prior to the initial release We recommend that you ...