First published: Fri Jun 02 2017(Updated: )
The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
digium Open Source | =13.0.0 | |
digium Open Source | =13.1.0 | |
digium Open Source | =13.1.0-rc1 | |
digium Open Source | =13.1.0-rc2 | |
digium Open Source | =13.2.0 | |
digium Open Source | =13.2.0-rc1 | |
digium Open Source | =13.3.0-rc1 | |
digium Open Source | =13.4.0 | |
digium Open Source | =13.4.0-rc1 | |
digium Open Source | =13.5.0 | |
digium Open Source | =13.5.0-rc1 | |
digium Open Source | =13.6.0-rc1 | |
digium Open Source | =13.7.0 | |
digium Open Source | =13.7.0-rc1 | |
digium Open Source | =13.8.0 | |
digium Open Source | =13.8.0-rc1 | |
digium Open Source | =13.8.1 | |
digium Open Source | =13.8.2 | |
digium Open Source | =13.9.0 | |
digium Open Source | =13.9.0-rc1 | |
digium Open Source | =13.10.0-rc1 | |
digium Open Source | =13.11.0-rc1 | |
digium Open Source | =13.12.0 | |
digium Open Source | =13.12.0-rc1 | |
digium Open Source | =13.12.1 | |
digium Open Source | =13.12.2 | |
digium Open Source | =13.13.0-rc1 | |
digium Open Source | =13.14.0-rc1 | |
digium Open Source | =13.15.0-rc1 | |
digium Open Source | =14.2.0 | |
digium Open Source | =14.2.0-rc1 | |
digium Open Source | =14.2.0-rc2 | |
Asterisk | =13.13.0 | |
Asterisk | =13.13.0-cert1 | |
Asterisk | =13.13.0-cert1-rc1 | |
Asterisk | =13.13.0-cert1-rc2 | |
Asterisk | =13.13.0-cert1-rc3 | |
Asterisk | =13.13.0-cert1-rc4 | |
Asterisk | =13.13.0-cert2 | |
Asterisk | =13.13.0-cert3 | |
Asterisk | =13.13.0-rc1 | |
Asterisk | =13.13.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9359 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2017-9359, update to Asterisk versions 13.15.1 or 14.4.1 and above.
CVE-2017-9359 affects Asterisk Open Source versions 13.x before 13.15.1 and 14.x before 14.4.1, along with various certified Asterisk versions.
CVE-2017-9359 can be exploited by remote attackers sending crafted packets leading to an out-of-bounds read and application crash.
Yes, exploit techniques have been documented which can leverage the denial of service vulnerability in CVE-2017-9359.