CVE-2016-9937

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2016-9937
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9937.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-9937
Published
2016-12-12T21:59:00Z
Modified
2024-09-03T01:33:07.496234Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chansip or anonymous in chanpjsip an SDP offer or answer is still processed and the crash occurs.

References

Affected packages

Git / github.com/asterisk/asterisk

Affected ranges

Type
GIT
Repo
https://github.com/asterisk/asterisk
Events

Affected versions

13.*

13.12.0
13.12.0-rc1
13.13.0
13.13.0-rc1
13.13.0-rc2