Vulnerability Name: | CVE-2017-16672 (CCN-134652) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-10-15 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-10-15 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Eventually Asterisk can run out of memory and crash. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-772 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-16672 Source: CCN Type: Asterisk Project Security Advisory - AST-2017-011 Memory/File Descriptor/RTP leak in pjsip session resource Source: CONFIRM Type: Vendor Advisory http://downloads.digium.com/pub/security/AST-2017-011.html Source: BID Type: Third Party Advisory, VDB Entry 101765 Source: CCN Type: BID-101765 Multiple Asterisk Products Information Disclosure Vulnerability Source: XF Type: UNKNOWN asterisk-cve201716672-dos(134652) Source: CONFIRM Type: Vendor Advisory https://issues.asterisk.org/jira/browse/ASTERISK-27345 Source: GENTOO Type: UNKNOWN GLSA-201811-11 Source: DEBIAN Type: UNKNOWN DSA-4076 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |