Source: asterisk Version: 1:13.18.5~dfsg-1 Severity: grave Tags: patch security upstream
Hi, the following vulnerability was published for asterisk. CVE-2018-7284[0]: | A Buffer Overflow issue was discovered in Asterisk through 13.19.1, | 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk | through 13.18-cert2. When processing a SUBSCRIBE request, the | res_pjsip_pubsub module stores the accepted formats present in the | Accept headers of the request. This code did not limit the number of | headers it processed, despite having a fixed limit of 32. If more than | 32 Accept headers were present, the code would write outside of its | memory and cause a crash. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-7284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284 [1] http://downloads.asterisk.org/pub/security/AST-2018-004.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team