Vulnerability Description
PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Open Source | 13.0.0 |
| Digium | Certified Asterisk | 13.13.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2017-002.txtThird Party Advisory
- http://www.debian.org/security/2017/dsa-3933
- http://www.securityfocus.com/bid/98572Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038529
- https://bugs.debian.org/863901Mailing ListThird Party Advisory
- http://downloads.asterisk.org/pub/security/AST-2017-002.txtThird Party Advisory
- http://www.debian.org/security/2017/dsa-3933
- http://www.securityfocus.com/bid/98572Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038529
- https://bugs.debian.org/863901Mailing ListThird Party Advisory
FAQ
What is CVE-2017-9372?
CVE-2017-9372 is a vulnerability with a CVSS score of 7.5 (HIGH). PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service...
How severe is CVE-2017-9372?
CVE-2017-9372 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9372?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Open Source, Digium Certified Asterisk.