ID

VAR-202312-1059


CVE

CVE-2023-37457


TITLE

Digium  of  Asterisk  Classic buffer overflow vulnerabilities in products from multiple vendors

Trust: 0.8

sources: JVNDB: JVNDB-2023-020247

DESCRIPTION

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa. Digium of Asterisk Classic buffer overflow vulnerabilities exist in products from multiple vendors.Information is tampered with and service operation is interrupted (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5596-1 security@debian.org https://www.debian.org/security/ Markus Koschany January 04, 2024 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : asterisk CVE ID : CVE-2023-37457 CVE-2023-38703 CVE-2023-49294 CVE-2023-49786 Debian Bug : 1059303 1059032 1059033 Multiple security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. CVE-2023-38703 PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce a use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. CVE-2023-49294 It is possible to read any arbitrary file even when the `live_dangerously` option is not enabled. CVE-2023-49786 Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. For the oldstable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u4. We recommend that you upgrade your asterisk packages. For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmWXIDJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeRqthAA0ZarRHMpoNwTCAiVuVzcNqGVls/XvEvDbw1DNgjeKptlm4qafmVxHd6F Jtloc8zD2w0sOCZCSbATZDosXlFCkAj09aI6oSfJOLBlqRDFVNhPn1Y4a1xOgAfl AZyn458v3TqlNFcZjJ89qHHociZ+fDfMUYpMsp/v9A4AOQjKn7AKYJ7aaL5PHR8b zejn2pP/8Hv592K4+xa5h/6a0AaXX0eOTlxZDFh7x93oP+op0k4v1J7ivP+Qs4wk T5iOqs6JrMc640ZprXB3c8HjapZt4ee5+Yp7An3Z7o/r9crXqT/6ocIRPmkomXVb bhZXSfEs5BmzkdWSnOBigSWthSp9umPKWWV9wUwSe1115XxhT43J7oBix9gkNCEu mN5Po/yaZQUDEtWx1DpVZtI3TNBwyv28f2XoUy72oq0WqEvBGC8hLDMXqjVWxhRh bRXfairiS/pfx2h4eIT5xUKX7xUUCEcGpZ2hIEgGGlS8TX2le+mWa+ipKNPYrBWJ Qvg+MJ2JD9O3jMMS85y7ISuWUDNSeIDUSa0E48QWExZd8tmuknyDgPx5i4/nDVC+ sxH1LnEgbUjLLfCCF0CZgbYebiEmUqyfvOSaJ3olekrxkje2WwVY+uJ4NJXBycPU +k3Db3c/h/zoYJ9A3ZKz/xu5L32grES2FMxdBDFeF/5VloO4/dg=N8+A -----END PGP SIGNATURE-----

Trust: 1.71

sources: NVD: CVE-2023-37457 // JVNDB: JVNDB-2023-020247 // PACKETSTORM: 176383

AFFECTED PRODUCTS

vendor:digiummodel:asteriskscope:lteversion:20.5.0

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:16.8.0

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:18.9

Trust: 1.0

vendor:digiummodel:asteriskscope:gteversion:19.0.0

Trust: 1.0

vendor:digiummodel:asteriskscope:eqversion:21.0.0

Trust: 1.0

vendor:digiummodel:asteriskscope:lteversion:18.20.0

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:13.13.0

Trust: 1.0

vendor:digiummodel:asteriskscope: - version: -

Trust: 0.8

vendor:sangomamodel:certified asteriskscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-020247 // NVD: CVE-2023-37457

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-37457
value: HIGH

Trust: 1.0

security-advisories@github.com: CVE-2023-37457
value: HIGH

Trust: 1.0

NVD: CVE-2023-37457
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2023-37457
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.2
version: 3.1

Trust: 1.0

security-advisories@github.com: CVE-2023-37457
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-37457
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-020247 // NVD: CVE-2023-37457 // NVD: CVE-2023-37457

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-020247 // NVD: CVE-2023-37457

EXTERNAL IDS

db:NVDid:CVE-2023-37457

Trust: 2.7

db:JVNDBid:JVNDB-2023-020247

Trust: 0.8

db:PACKETSTORMid:176383

Trust: 0.1

sources: JVNDB: JVNDB-2023-020247 // PACKETSTORM: 176383 // NVD: CVE-2023-37457

REFERENCES

url:https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa

Trust: 1.8

url:https://github.com/asterisk/asterisk/security/advisories/ghsa-98rc-4j27-74hh

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-37457

Trust: 0.9

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-38703

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-49294

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/asterisk

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-49786

Trust: 0.1

sources: JVNDB: JVNDB-2023-020247 // PACKETSTORM: 176383 // NVD: CVE-2023-37457

CREDITS

Debian

Trust: 0.1

sources: PACKETSTORM: 176383

SOURCES

db:JVNDBid:JVNDB-2023-020247
db:PACKETSTORMid:176383
db:NVDid:CVE-2023-37457

LAST UPDATE DATE

2024-08-14T14:30:07.728000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2023-020247date:2024-01-16T02:56:00
db:NVDid:CVE-2023-37457date:2023-12-29T00:15:49.697

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2023-020247date:2024-01-16T00:00:00
db:PACKETSTORMid:176383date:2024-01-05T14:31:02
db:NVDid:CVE-2023-37457date:2023-12-14T20:15:52.260