Lucene search

K
cve[email protected]CVE-2023-37457
HistoryDec 14, 2023 - 8:15 p.m.

CVE-2023-37457

2023-12-1420:15:52
CWE-120
web.nvd.nist.gov
34
asterisk
cve-2023-37457
security
update
buffer overflow
crash
patch

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.8%

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the ‘update’ functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the ‘update’ functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.

Affected configurations

Vulners
NVD
Node
asteriskasteriskRange18.20.0
OR
asteriskasteriskRange19.0.020.5.0
OR
asteriskasteriskMatch21.0.0
OR
asteriskasteriskRange18.9-cert5
VendorProductVersionCPE
asteriskasterisk*cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*
asteriskasterisk*cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*
asteriskasterisk21.0.0cpe:2.3:a:asterisk:asterisk:21.0.0:*:*:*:*:*:*:*
asteriskasterisk*cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "asterisk",
    "product": "asterisk",
    "versions": [
      {
        "version": "<= 18.20.0",
        "status": "affected"
      },
      {
        "version": ">= 19.0.0, <= 20.5.0",
        "status": "affected"
      },
      {
        "version": "= 21.0.0",
        "status": "affected"
      },
      {
        "version": " <= 18.9-cert5",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.8%