製品・ソフトウェアに関する情報
Asterisk Open Source および Certified Asterisk におけるリソースの枯渇に関する脆弱性
Title Asterisk Open Source および Certified Asterisk におけるリソースの枯渇に関する脆弱性
Summary

Asterisk Open Source および Certified Asterisk には、リソースの枯渇に関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 13, 2017, midnight
Registration Date June 30, 2017, 10 a.m.
Last Update June 30, 2017, 10 a.m.
CVSS3.0 : 重要
Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
Digium
Asterisk Open Source 13.15.1 未満の 13.x
Asterisk Open Source 14.4.1 未満の 14.x
Certified Asterisk 13.13-cert4 未満の 13.13
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2017年06月30日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-9358
Summary

A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).

Publication Date June 2, 2017, 2:29 p.m.
Registration Date Jan. 26, 2021, 1:31 p.m.
Last Update Nov. 21, 2024, 12:35 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:sangoma:asterisk:14.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.2.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:14.0.0:beta1:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List