Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-7284Improper Restriction of Operations within the Bounds of a Memory Buffer in Asterisk

Severity
7.5HIGHNVD
EPSS
65.2%
top 1.51%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 22
Latest updateMay 14

Description

A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/asterisk< asterisk 1:13.20.0~dfsg-1 (bullseye)
Debiandigium/asterisk< 1:13.20.0~dfsg-1
NVDdigium/asterisk14.0.014.7.5+2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h9x3-h6rr-35ww: A Buffer Overflow issue was discovered in Asterisk through 132022-05-14
OSV
CVE-2018-7284: A Buffer Overflow issue was discovered in Asterisk through 132018-02-22

💥Exploits & PoCs

1
Exploit-DB
Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption2018-02-27

📋Vendor Advisories

1
Debian
CVE-2018-7284: asterisk - A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through...2018

💬Community

3
Bugzilla
CVE-2018-7284 asterisk: memory corruption in SUBSCRIBE message with a large Accept value [epel-6]2018-02-22
Bugzilla
CVE-2018-7284 asterisk: memory corruption in SUBSCRIBE message with a large Accept value2018-02-22
Bugzilla
CVE-2018-7284 asterisk: memory corruption in SUBSCRIBE message with a large Accept value [fedora-all]2018-02-22
CVE-2018-7284 — Debian Asterisk vulnerability | cvebase