mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
181 lines
6.3 KiB
JSON
181 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2016-9937",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-12-12T21:59:00.303",
|
|
"lastModified": "2017-07-27T01:29:07.163",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en Asterisk Open Source 13.12.x y 13.13.x en versiones anteriores 13.13.1 y 14.x en versiones anteriores 14.2.1. Si se recibe una prueba o respuesta SDP con el codec Opus y con los par\u00e1metros de formato separados usando un espacio de c\u00f3digo responsable de an\u00e1lisis llamar\u00e1 a si mismo de forma recursiva hasta que se bloquee. Esto ocurre cuando el c\u00f3digo no maneja adecuadamente los espacios que separan los par\u00e1metros. Esto NO requiere que el punto final tenga Opus configurado en Asterisk. Esto tampoco requiere que el punto final est\u00e9 autenticado. Si el invitado est\u00e1 habilitado para chan_sip o an\u00f3nimo en chan_pjsip una prueba o respuesta SDP se sigue procesando y se produce el bloqueo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://downloads.asterisk.org/pub/security/AST-2016-008-13.diff",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://downloads.asterisk.org/pub/security/AST-2016-008-14.diff",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://downloads.asterisk.org/pub/security/AST-2016-008.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/94792",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1037407",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-26579",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |