Vulnerability Description
Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 13.0.0 |
| Digium | Certified Asterisk | <= 13.13-cert2 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2017-001.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/97377Third Party AdvisoryVDB Entry
- https://bugs.debian.org/859910PatchThird Party Advisory
- http://downloads.asterisk.org/pub/security/AST-2017-001.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/97377Third Party AdvisoryVDB Entry
- https://bugs.debian.org/859910PatchThird Party Advisory
FAQ
What is CVE-2017-7617?
CVE-2017-7617 is a vulnerability with a CVSS score of 8.8 (HIGH). Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, rel...
How severe is CVE-2017-7617?
CVE-2017-7617 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7617?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk, Digium Certified Asterisk.