First published: Wed Dec 13 2017(Updated: )
A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium Asterisk | >=13.0.0<13.18.4 | |
Digium Asterisk | >=14.0.0<14.7.4 | |
Digium Asterisk | >=15.0.0<15.1.4 | |
Digium Certified Asterisk | <=13.13 | |
Digium Certified Asterisk | =13.13-cert1 | |
Digium Certified Asterisk | =13.13-cert1_rc1 | |
Digium Certified Asterisk | =13.13-cert1_rc2 | |
Digium Certified Asterisk | =13.13-cert1_rc3 | |
Digium Certified Asterisk | =13.13-cert1_rc4 | |
Digium Certified Asterisk | =13.13-cert2 | |
Digium Certified Asterisk | =13.13-cert3 | |
Digium Certified Asterisk | =13.13-cert4 | |
Digium Certified Asterisk | =13.13-cert5 | |
Digium Certified Asterisk | =13.13-cert6 | |
Digium Certified Asterisk | =13.13-cert7 | |
Digium Certified Asterisk | =13.13-cert8 | |
debian/asterisk | 1:16.2.1~dfsg-1+deb10u2 1:16.28.0~dfsg-0+deb10u3 1:16.28.0~dfsg-0+deb11u3 1:20.4.0~dfsg+~cs6.13.40431414-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-17664.
The severity of CVE-2017-17664 is medium with a CVSS score of 5.9.
The affected software includes Asterisk Open Source versions 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4, as well as Certified Asterisk before 13.13-cert9.
The vulnerability in Asterisk Open Source versions 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4, and Certified Asterisk before 13.13-cert9 can cause a crash when certain compound RTCP packets are received, which triggers a crash in the RTCP Stack.
To fix the vulnerability, update to Asterisk Open Source versions 13.18.4, 14.7.4, or 15.1.4, or upgrade to Certified Asterisk 13.13-cert9 or later.