CVE-2018-19278 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk
Severity
7.5HIGHNVD
EPSS
3.3%
top 12.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14
Latest updateMay 14
Description
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2018-19278: asterisk - Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6...↗2018
💬Community
3Bugzilla
▶
Bugzilla
▶