CVE-2017-14603
high-risk
Published 2017-10-10
In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.
Do I need to act?
-
0.75% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (6)
Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2017-008.html
Third Party Advisory
http://www.debian.org/security/2017/dsa-3990
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-27274
Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2017-008.html
Third Party Advisory
http://www.debian.org/security/2017/dsa-3990
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-27274
62
/ 100
high-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
33/34 · Critical