Classic Buffer Overflow Affecting asterisk package, versions [,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.27% (68th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-6129128
  • published15 Dec 2023
  • disclosed14 Dec 2023
  • creditUnknown

Introduced: 14 Dec 2023

CVE-2023-37457  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade asterisk to version certified-18.9-cert6, 18.20.1, 20.5.1, 21.0.1 or higher.

Overview

Affected versions of this package are vulnerable to Classic Buffer Overflow via the update functionality of the PJSIP_HEADER dialplan function. An attacker can overwrite memory or cause a crash.

Notes:

1)This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source.

2)If the 'update' functionality is not used the vulnerability does not occur.

References

CVSS Scores

version 3.1