Bug 1067328 - (CVE-2017-16671) VUL-0: CVE-2017-16671: asterisk: Buffer overflow when setting the user field for Party B on a CDR
(CVE-2017-16671)
VUL-0: CVE-2017-16671: asterisk: Buffer overflow when setting the user field ...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Christian Müller
Security Team bot
https://smash.suse.de/issue/194708/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-11-09 07:14 UTC by Johannes Segitz
Modified: 2019-12-18 15:03 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2017-11-09 07:14:40 UTC
CVE-2017-16671

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before
13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13
before 13.13-cert7. No size checking is done when setting the user field for
Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large
string and write past the end of the user field storage buffer. NOTE: this is
different from CVE-2017-7617, which was only about the Party A buffer.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16671
http://www.cvedetails.com/cve/CVE-2017-16671/
https://issues.asterisk.org/jira/browse/ASTERISK-27337
http://downloads.digium.com/pub/security/AST-2017-010.html
Comment 1 Marcus Meissner 2019-12-18 15:03:39 UTC
internal tool, no longer in use