First published: Fri Jun 02 2017(Updated: )
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =13.0.0 | |
Asterisk | =13.1.0 | |
Asterisk | =13.1.0-rc1 | |
Asterisk | =13.1.0-rc2 | |
Asterisk | =13.2.0 | |
Asterisk | =13.2.0-rc1 | |
Asterisk | =13.3.0-rc1 | |
Asterisk | =13.4.0 | |
Asterisk | =13.4.0-rc1 | |
Asterisk | =13.5.0 | |
Asterisk | =13.5.0-rc1 | |
Asterisk | =13.6.0-rc1 | |
Asterisk | =13.7.0 | |
Asterisk | =13.7.0-rc1 | |
Asterisk | =13.8.0 | |
Asterisk | =13.8.0-rc1 | |
Asterisk | =13.8.1 | |
Asterisk | =13.8.2 | |
Asterisk | =13.9.0 | |
Asterisk | =13.9.0-rc1 | |
Asterisk | =13.10.0-rc1 | |
Asterisk | =13.11.0-rc1 | |
Asterisk | =13.12.0 | |
Asterisk | =13.12.0-rc1 | |
Asterisk | =13.12.1 | |
Asterisk | =13.12.2 | |
Asterisk | =13.13.0-rc1 | |
Asterisk | =13.14.0-rc1 | |
Asterisk | =13.15.0-rc1 | |
Asterisk | =13.13.0 | |
Asterisk | =13.13.0-cert1 | |
Asterisk | =13.13.0-cert1-rc1 | |
Asterisk | =13.13.0-cert1-rc2 | |
Asterisk | =13.13.0-cert1-rc3 | |
Asterisk | =13.13.0-cert1-rc4 | |
Asterisk | =13.13.0-cert2 | |
Asterisk | =13.13.0-cert3 | |
Asterisk | =13.13.0-rc1 | |
Asterisk | =13.13.0-rc2 | |
Asterisk | =14.0.0 | |
Asterisk | =14.0.0-beta1 | |
Asterisk | =14.0.0-beta2 | |
Asterisk | =14.0.0-rc1 | |
Asterisk | =14.1.0-rc1 | |
Asterisk | =14.2.0 | |
Asterisk | =14.2.0-rc1 | |
Asterisk | =14.2.0-rc2 | |
Asterisk | =14.2.1 | |
Asterisk | =14.3.0-rc1 | |
Asterisk | =14.4.0-rc1 | |
Asterisk | =13.0.0 | |
Asterisk | =13.1.0 | |
Asterisk | =13.1.0-rc1 | |
Asterisk | =13.1.0-rc2 | |
Asterisk | =13.2.0 | |
Asterisk | =13.2.0-rc1 | |
Asterisk | =13.3.0-rc1 | |
Asterisk | =13.4.0 | |
Asterisk | =13.4.0-rc1 | |
Asterisk | =13.5.0 | |
Asterisk | =13.5.0-rc1 | |
Asterisk | =13.6.0-rc1 | |
Asterisk | =13.7.0 | |
Asterisk | =13.7.0-rc1 | |
Asterisk | =13.8.0 | |
Asterisk | =13.8.0-rc1 | |
Asterisk | =13.8.1 | |
Asterisk | =13.8.2 | |
Asterisk | =13.9.0 | |
Asterisk | =13.9.0-rc1 | |
Asterisk | =13.10.0-rc1 | |
Asterisk | =13.11.0-rc1 | |
Asterisk | =13.12.0 | |
Asterisk | =13.12.0-rc1 | |
Asterisk | =13.12.1 | |
Asterisk | =13.12.2 | |
Asterisk | =13.13.0-rc1 | |
Asterisk | =13.14.0-rc1 | |
Asterisk | =13.15.0-rc1 | |
Asterisk | =14.0.0 | |
Asterisk | =14.0.0-beta1 | |
Asterisk | =14.0.0-beta2 | |
Asterisk | =14.0.0-rc1 | |
Asterisk | =14.1.0-rc1 | |
Asterisk | =14.2.0 | |
Asterisk | =14.2.0-rc1 | |
Asterisk | =14.2.0-rc2 | |
Asterisk | =14.2.1 | |
Asterisk | =14.3.0-rc1 | |
Asterisk | =14.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9358 is classified as high due to its potential for causing memory exhaustion leading to service disruptions.
To fix CVE-2017-9358, upgrade to Asterisk version 13.15.1, 14.4.1, or any later version of the software.
CVE-2017-9358 affects Asterisk Open Source versions 13.x prior to 13.15.1 and 14.x prior to 14.4.1.
An attacker can exploit CVE-2017-9358 by sending specially crafted SCCP packets that trigger an infinite loop, resulting in memory exhaustion.
Yes, CVE-2017-9358 is present in Certified Asterisk version 13.13 prior to 13.13-cert4.