Description
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1038531
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/98573
Third Party Advisory x_refsource_confirm
http://downloads.asterisk.org/pub/security/AST-2017-004.txt
Mailing List, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/863906
Scores
CVSS v3
7.5
EPSS
0.0119
EPSS Percentile
78.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (27)
asterisk/certified_asterisk
13.13.0 (10 CPE variants)
sangoma/asterisk
13.0.0
sangoma/asterisk
13.1.0 (3 CPE variants)
sangoma/asterisk
13.2.0 (2 CPE variants)
sangoma/asterisk
13.3.0 rc1
sangoma/asterisk
13.4.0 (2 CPE variants)
sangoma/asterisk
13.5.0 (2 CPE variants)
sangoma/asterisk
13.6.0 rc1
sangoma/asterisk
13.7.0 (2 CPE variants)
sangoma/asterisk
13.8.0 (2 CPE variants)
... and 17 more
Published
Jun 02, 2017
Tracked Since
Feb 18, 2026