In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.
References
Link | Resource |
---|---|
http://downloads.asterisk.org/pub/security/AST-2017-008.html | Vendor Advisory |
http://www.debian.org/security/2017/dsa-3990 | Third Party Advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-27274 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2017-10-10 01:30
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14603
Mitre link : CVE-2017-14603
CVE.ORG link : CVE-2017-14603
JSON object : View
Products Affected
digium
- certified_asterisk
- asterisk
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor