Lucene search

K
cve[email protected]CVE-2017-9372
HistoryJun 02, 2017 - 2:29 p.m.

CVE-2017-9372

2017-06-0214:29:00
CWE-119
web.nvd.nist.gov
31
pjsip
asterisk open source
denial of service
buffer overflow
application crash
cve-2017-9372

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.012 Low

EPSS

Percentile

85.3%

PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.

Affected configurations

NVD
Node
digiumopen_sourceMatch13.0.0
OR
digiumopen_sourceMatch13.1.0
OR
digiumopen_sourceMatch13.1.0rc1
OR
digiumopen_sourceMatch13.1.0rc2
OR
digiumopen_sourceMatch13.2.0
OR
digiumopen_sourceMatch13.2.0rc1
OR
digiumopen_sourceMatch13.3.0rc1
OR
digiumopen_sourceMatch13.4.0
OR
digiumopen_sourceMatch13.4.0rc1
OR
digiumopen_sourceMatch13.5.0
OR
digiumopen_sourceMatch13.5.0rc1
OR
digiumopen_sourceMatch13.6.0rc1
OR
digiumopen_sourceMatch13.7.0
OR
digiumopen_sourceMatch13.7.0rc1
OR
digiumopen_sourceMatch13.8.0
OR
digiumopen_sourceMatch13.8.0rc1
OR
digiumopen_sourceMatch13.8.1
OR
digiumopen_sourceMatch13.8.2
OR
digiumopen_sourceMatch13.9.0
OR
digiumopen_sourceMatch13.9.0rc1
OR
digiumopen_sourceMatch13.10.0rc1
OR
digiumopen_sourceMatch13.11.0rc1
OR
digiumopen_sourceMatch13.12.0
OR
digiumopen_sourceMatch13.12.0rc1
OR
digiumopen_sourceMatch13.12.1
OR
digiumopen_sourceMatch13.12.2
OR
digiumopen_sourceMatch13.13.0rc1
OR
digiumopen_sourceMatch13.14.0rc1
OR
digiumopen_sourceMatch13.15.0rc1
Node
digiumopen_sourceMatch14.0.0
OR
digiumopen_sourceMatch14.0.0beta1
OR
digiumopen_sourceMatch14.0.0beta2
OR
digiumopen_sourceMatch14.0.0rc1
OR
digiumopen_sourceMatch14.1.0rc1
OR
digiumopen_sourceMatch14.2.0
OR
digiumopen_sourceMatch14.2.0rc1
OR
digiumopen_sourceMatch14.2.0rc2
OR
digiumopen_sourceMatch14.2.1
OR
digiumopen_sourceMatch14.3.0rc1
OR
digiumopen_sourceMatch14.4.0rc1
Node
digiumcertified_asteriskMatch13.13.0
OR
digiumcertified_asteriskMatch13.13.0cert1
OR
digiumcertified_asteriskMatch13.13.0cert1-rc1
OR
digiumcertified_asteriskMatch13.13.0cert1-rc2
OR
digiumcertified_asteriskMatch13.13.0cert1-rc3
OR
digiumcertified_asteriskMatch13.13.0cert1-rc4
OR
digiumcertified_asteriskMatch13.13.0cert2
OR
digiumcertified_asteriskMatch13.13.0cert3
OR
digiumcertified_asteriskMatch13.13.0rc1
OR
digiumcertified_asteriskMatch13.13.0rc2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.012 Low

EPSS

Percentile

85.3%