A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18293 | A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 15 Aug 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangoma
Sangoma asterisk |
|
| CPEs | cpe:2.3:a:asterisk:open_source:13.1.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.1.0:rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.10.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.11.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.12.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.12.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.12.1:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.12.2:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.13.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.14.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.15.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.2.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.3.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.4.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.5.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.6.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.7.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.8.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.8.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.8.1:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.8.2:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.9.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:13.9.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.0.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.2.0:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.2.0:rc2:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.2.1:*:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.3.0:rc1:*:*:*:*:*:* cpe:2.3:a:asterisk:open_source:14.4.0:rc1:*:*:*:*:*:* |
cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.1.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.12.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.2.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.4.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.5.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.7.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.8.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.9.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.0.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.2.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.2.0:rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.2.1:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.3.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:14.4.0:rc1:*:*:*:*:*:* |
| Vendors & Products |
Asterisk open Source
|
Sangoma
Sangoma asterisk |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:02:44.392Z
Reserved: 2017-06-01T00:00:00.000Z
Link: CVE-2017-9358
No data.
Status : Deferred
Published: 2017-06-02T05:29:00.700
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9358
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD