A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
History

Thu, 15 Aug 2024 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Sangoma
Sangoma asterisk
CPEs cpe:2.3:a:asterisk:open_source:13.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.12.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.12.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.12.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.4.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.7.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.8.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.8.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.8.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.9.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:13.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:14.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.4.0:rc1:*:*:*:*:*:*
Vendors & Products Asterisk open Source
Sangoma
Sangoma asterisk

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2017-06-02T05:04:00

Updated: 2024-08-05T17:02:44.392Z

Reserved: 2017-06-01T00:00:00

Link: CVE-2017-9358

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-06-02T05:29:00.700

Modified: 2024-11-21T03:35:54.630

Link: CVE-2017-9358

cve-icon Redhat

No data.