Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-37457
HistoryDec 14, 2023 - 12:00 a.m.

CVE-2023-37457

2023-12-1400:00:00
ubuntu.com
ubuntu.com
8
asterisk
pjsip_header
buffer overflow
security patch
memory corruption

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

46.6%

Asterisk is an open source private branch exchange and telephony toolkit.
In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as
well as ceritifed-asterisk 18.9-cert5 and prior, the ‘update’ functionality
of the PJSIP_HEADER dialplan function can exceed the available buffer space
for storing the new value of a header. By doing so this can overwrite
memory or cause a crash. This is not externally exploitable, unless
dialplan is explicitly written to update a header based on data from an
outside source. If the ‘update’ functionality is not used the vulnerability
does not occur. A patch is available at commit
a1ca0268254374b515fa5992f01340f7717113fa.

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

46.6%