NA

CVE-2023-37457

Published: 14/12/2023 Updated: 29/12/2023
CVSS v3 Base Score: 8.2 | Impact Score: 4.2 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.

Vulnerable Product Search on Vulmon Subscribe to Product

sangoma certified asterisk 18.9

sangoma certified asterisk 13.13.0

sangoma certified asterisk 16.8.0

digium asterisk 21.0.0

digium asterisk

Vendor Advisories

Debian Bug report logs - #1059303 asterisk: CVE-2023-37457 CVE-2023-38703 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 22 Dec 2023 13:30:01 UTC Severity: grave Tags: security, upstream ...