Vulnerability Description
An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | >= 13.0.0, <= 13.18.4 |
| Digium | Certified Asterisk | 13.1.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2017-014.htmlVendor Advisory
- http://www.securitytracker.com/id/1040056Third Party AdvisoryVDB Entry
- https://issues.asterisk.org/jira/browse/ASTERISK-27480Issue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201811-11
- http://downloads.asterisk.org/pub/security/AST-2017-014.htmlVendor Advisory
- http://www.securitytracker.com/id/1040056Third Party AdvisoryVDB Entry
- https://issues.asterisk.org/jira/browse/ASTERISK-27480Issue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201811-11
FAQ
What is CVE-2017-17850?
CVE-2017-17850 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must ...
How severe is CVE-2017-17850?
CVE-2017-17850 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17850?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk, Digium Certified Asterisk.