RULE(RULE ID:712914)

Rule General Information
Release Date: 2019-07-04
Rule Name: Digium Asterisk Subscribe Message Buffer Overflow Vulnerability (CVE-2018-7284)
Severity:
CVE ID:
Rule Protection Details
Description: A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityTrackerID:1040416
ExploitDB:44184
SecurityFocusBID:103151
https://www.debian.org/security/2018/dsa-4320
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://issues.asterisk.org/jira/browse/ASTERISK-27640