Learn about CVE-2018-7284, a Buffer Overflow vulnerability in Asterisk versions 13.19.1, 14.x to 14.7.5, and 15.x to 15.2.1, impacting the res_pjsip_pubsub module. Find out how to mitigate this issue.
A vulnerability named Buffer Overflow has been identified in Asterisk versions 13.19.1, 14.x to 14.7.5, and 15.x to 15.2.1, as well as Certified Asterisk version 13.18-cert2. This vulnerability affects the res_pjsip_pubsub module, specifically when handling SUBSCRIBE requests. The module stores the accepted formats from the headers present in the request's Accept field. However, the module does not impose a limit on the number of headers it processes, even though there is a fixed limit of 32. Consequently, if the number of Accept headers exceeds 32, the module will write outside of its allocated memory and potentially cause a system crash.
Understanding CVE-2018-7284
A Buffer Overflow issue was discovered in Asterisk through versions 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
What is CVE-2018-7284?
The Impact of CVE-2018-7284
Technical Details of CVE-2018-7284
Asterisk versions 13.19.1, 14.x to 14.7.5, and 15.x to 15.2.1, as well as Certified Asterisk version 13.18-cert2, are affected by this vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2018-7284, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates