CVE-2023-37457

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-37457
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-37457.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-37457
Aliases
  • GHSA-98rc-4j27-74hh
Downstream
Published
2023-12-14T19:43:30Z
Modified
2025-10-22T18:39:19.907008Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Asterisk's PJSIP_HEADER dialplan function can overwrite memory/cause crash when using 'update'
Details

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.

Database specific
{
    "cwe_ids": [
        "CWE-120"
    ]
}
References

Affected packages

Git / github.com/asterisk/asterisk

Affected ranges

Type
GIT
Repo
https://github.com/asterisk/asterisk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/asterisk/asterisk
Events
Type
GIT
Repo
https://github.com/asterisk/asterisk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/asterisk/asterisk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

18.*

18.17.0
18.17.0-rc1
18.17.1
18.18.0
18.18.0-rc1
18.18.1
18.19.0
18.19.0-rc1
18.19.0-rc2
18.20.0
18.20.0-rc1
18.9.0
18.9.0-rc1

21.*

21.0.0
21.0.0-pre1
21.0.0-rc1

certified-18.*

certified-18.9-cert4
certified-18.9-cert5

certified/18.*

certified/18.9-cert1
certified/18.9-cert1-rc1
certified/18.9-cert2
certified/18.9-cert3
certified/18.9-cert4