Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 636972 (CVE-2017-16671, CVE-2017-16672) - <net-misc/asterisk-13.18.1: Multiple vulnerabilities (CVE-2017-{16671,16672})
Summary: <net-misc/asterisk-13.18.1: Multiple vulnerabilities (CVE-2017-{16671,16672})
Status: RESOLVED FIXED
Alias: CVE-2017-16671, CVE-2017-16672
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-11-09 16:16 UTC by GLSAMaker/CVETool Bot
Modified: 2018-11-24 19:46 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2017-11-09 16:16:41 UTC
CVE-2017-16672 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16672):
  An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before
  14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before
  13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is
  created and that call gets rejected before the session itself is fully
  established. When this happens the session object never gets destroyed.
  Eventually Asterisk can run out of memory and crash.

CVE-2017-16671 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16671):
  A Buffer Overflow issue was discovered in Asterisk Open Source 13 before
  13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13
  before 13.13-cert7. No size checking is done when setting the user field for
  Party B on a CDR. Thus, it is possible for someone to use an arbitrarily
  large string and write past the end of the user field storage buffer. NOTE:
  this is different from CVE-2017-7617, which was only about the Party A
  buffer.
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-11-09 16:17:38 UTC
@Maintainer please call for stabilization when ready.

Thank you.
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2018-11-13 01:01:21 UTC
GLSA Vote: Yes

New GLSA Request filed.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2018-11-24 19:46:07 UTC
This issue was resolved and addressed in
 GLSA 201811-11 at https://security.gentoo.org/glsa/201811-11
by GLSA coordinator Aaron Bauman (b-man).