A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://downloads.asterisk.org/pub/security/AST-2018-004.html | patch vendor advisory |
https://www.exploit-db.com/exploits/44184/ | exploit vdb entry third party advisory |
https://www.debian.org/security/2018/dsa-4320 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/103151 | vdb entry third party advisory |
http://www.securitytracker.com/id/1040416 | vdb entry third party advisory |