Out-of-Bounds Affecting asterisk package, versions [13.0.0,13.18.1)[14.0.0,14.7.1)[15.0.0,15.1.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
9.08% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371645
  • published26 Jan 2022
  • disclosed9 Nov 2017
  • creditUnknown

Introduced: 9 Nov 2017

CVE-2017-16672  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade asterisk to version 13.18.1, 14.7.1, 15.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Eventually Asterisk can run out of memory and crash.

CVSS Scores

version 3.1