CVE-2017-16671

Priority
Description
A Buffer Overflow issue was discovered in Asterisk Open Source 13 before
13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk
13.13 before 13.13-cert7. No size checking is done when setting the user
field for Party B on a CDR. Thus, it is possible for someone to use an
arbitrarily large string and write past the end of the user field storage
buffer. NOTE: this is different from CVE-2017-7617, which was only about
the Party A buffer.
Ubuntu-Description
It was discovered that asterisk did not properly check the length of certain
input. A remote attacker could use this vulnerability to cause a denial of
service (crash) or potentially execute arbitrary code.
Notes
Package
Upstream:released (1:13.18.1~dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:13.18.3~dfsg-1ubuntu4)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:13.18.3~dfsg-1ubuntu4)
Ubuntu 20.04 (Focal Fossa):not-affected (1:13.18.3~dfsg-1ubuntu4)
Patches:
Upstream:http://downloads.asterisk.org/pub/security/AST-2017-010-13.diff
More Information

Updated: 2020-04-24 03:38:57 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)