CVE-2017-7617

Priority
Description
Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1
and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3
because of a buffer overflow in a CDR user field, related to X-ClientCode
in chan_sip, the CDR dialplan function, and the AMI Monitor action.
Ubuntu-Description
Alex Villacis Lasso discovered that asterisk did not properly check the length
of certain input. A remote attacker could use this vulnerability to cause a
denial of service (crash) or potentially execute arbitrary code.
Notes
Package
Upstream:released (1:13.14.1~dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:13.18.3~dfsg-1ubuntu4)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:13.18.3~dfsg-1ubuntu4)
Ubuntu 20.04 (Focal Fossa):not-affected (1:13.18.3~dfsg-1ubuntu4)
Patches:
Upstream:http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff
More Information

Updated: 2020-04-24 03:44:09 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)