Vulnerability Description
In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 13.0.0 |
| Digium | Certified Asterisk | 11.6 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2017-008.htmlVendor Advisory
- http://www.debian.org/security/2017/dsa-3990Third Party Advisory
- https://issues.asterisk.org/jira/browse/ASTERISK-27274Issue TrackingThird Party Advisory
- http://downloads.asterisk.org/pub/security/AST-2017-008.htmlVendor Advisory
- http://www.debian.org/security/2017/dsa-3990Third Party Advisory
- https://issues.asterisk.org/jira/browse/ASTERISK-27274Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-14603?
CVE-2017-14603 is a vulnerability with a CVSS score of 7.5 (HIGH). In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow...
How severe is CVE-2017-14603?
CVE-2017-14603 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14603?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk, Digium Certified Asterisk.