8.2

CVE-2023-37457

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DigiumAsterisk Version <= 18.20.0
DigiumAsterisk Version >= 19.0.0 <= 20.5.0
DigiumAsterisk Version21.0.0
SangomaCertified Asterisk Version13.13.0
SangomaCertified Asterisk Version13.13.0 Updatecert1
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc1
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc2
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc3
SangomaCertified Asterisk Version13.13.0 Updatecert1-rc4
SangomaCertified Asterisk Version13.13.0 Updatecert2
SangomaCertified Asterisk Version13.13.0 Updatecert3
SangomaCertified Asterisk Version13.13.0 Updaterc1
SangomaCertified Asterisk Version13.13.0 Updaterc2
SangomaCertified Asterisk Version16.8.0 Update-
SangomaCertified Asterisk Version16.8.0 Updatecert1
SangomaCertified Asterisk Version16.8.0 Updatecert10
SangomaCertified Asterisk Version16.8.0 Updatecert11
SangomaCertified Asterisk Version16.8.0 Updatecert12
SangomaCertified Asterisk Version16.8.0 Updatecert2
SangomaCertified Asterisk Version16.8.0 Updatecert3
SangomaCertified Asterisk Version16.8.0 Updatecert4
SangomaCertified Asterisk Version16.8.0 Updatecert5
SangomaCertified Asterisk Version16.8.0 Updatecert6
SangomaCertified Asterisk Version16.8.0 Updatecert7
SangomaCertified Asterisk Version16.8.0 Updatecert8
SangomaCertified Asterisk Version16.8.0 Updatecert9
SangomaCertified Asterisk Version18.9 Updatecert1
SangomaCertified Asterisk Version18.9 Updatecert2
SangomaCertified Asterisk Version18.9 Updatecert3
SangomaCertified Asterisk Version18.9 Updatecert4
SangomaCertified Asterisk Version18.9 Updatecert5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.141
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
security-advisories@github.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.