UBUNTU-CVE-2023-37457

Source
https://ubuntu.com/security/CVE-2023-37457
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-37457.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-37457
Related
Published
2023-12-14T20:15:00Z
Modified
2024-10-15T14:11:38Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
Summary
[none]
Details

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.

References

Affected packages

Ubuntu:Pro:16.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:13.*

1:13.1.0~dfsg-1.1ubuntu3
1:13.1.0~dfsg-1.1ubuntu4
1:13.1.0~dfsg-1.1ubuntu4.1
1:13.1.0~dfsg-1.1ubuntu4.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:13.*

1:13.17.2~dfsg-1ubuntu1
1:13.17.2~dfsg-2ubuntu1
1:13.18.1~dfsg-1ubuntu1
1:13.18.3~dfsg-1ubuntu1
1:13.18.3~dfsg-1ubuntu2
1:13.18.3~dfsg-1ubuntu3
1:13.18.3~dfsg-1ubuntu4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:16.*

1:16.2.1~dfsg-2build2
1:16.2.1~dfsg-2build3
1:16.2.1~dfsg-2ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:16.*

1:16.16.1~dfsg-2
1:16.16.1~dfsg-4
1:16.16.1~dfsg-4build1
1:16.16.1~dfsg+~2.10-1

1:18.*

1:18.10.0~dfsg+~cs6.10.40431411-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:20.*

1:20.6.0~dfsg+~cs6.13.40431414-2build5
1:20.8.1~dfsg+~cs6.14.40431414-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:20.*

1:20.4.0~dfsg+~cs6.13.40431414-2
1:20.5.0~dfsg+~cs6.13.40431414-1
1:20.5.1~dfsg+~cs6.13.40431414-1
1:20.5.2~dfsg+~cs6.13.40431414-1
1:20.6.0~dfsg+~cs6.13.40431414-1
1:20.6.0~dfsg+~cs6.13.40431414-2
1:20.6.0~dfsg+~cs6.13.40431414-2build3
1:20.6.0~dfsg+~cs6.13.40431414-2build4
1:20.6.0~dfsg+~cs6.13.40431414-2build5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}