Information Exposure Affecting asterisk package, versions [,11.6)[11.25.0,11.25.3)[13.0,13.13)[13.17.0,13.17.2)[14.6.0,14.6.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.43% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371606
  • published26 Jan 2022
  • disclosed10 Oct 2017
  • creditUnknown

Introduced: 10 Oct 2017

CVE-2017-14603  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade asterisk to version 11.6, 11.25.3, 13.13, 13.17.2, 14.6.2 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.

CVSS Base Scores

version 3.1