Asterisk 13.13 < 13.13-cert3 / 13.x < 13.14.1 / 14.x < 14.3.1 CDR user Field RCE (AST-2017-001)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A telephony application running on the remote host is affected by a
remote code execution vulnerability.

Description :

According to its SIP banner, the version of Asterisk running on the
remote host is 13.13 prior to 13.13-cert3, 13.x prior to 13.14.1, or
14.x prior to 14.3.1. Is it, therefore, affected by a buffer overflow
condition due to a failure to check the size when setting the user
field on a CDR. An authenticated, remote attacker can exploit this,
via a large string, to write past the end of the user field storage
buffer, resulting in a denial of service condition or the execution of
arbitrary code.

Note that this vulnerability affects any system using CDRs that also
makes use of the following :

- The 'X-ClientCode' header within a SIP INFO message when using
chan_sip and the 'useclientcode' option is enabled (which is
disabled by default).

- The CDR dialplan() function executed from AMI when setting the
user field.

- The AMI Monitor action when using a long file name or path.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://downloads.asterisk.org/pub/security/AST-2017-001.html

Solution :

Upgrade to Asterisk version 13.13-cert3 / 13.14.1 / 14.3.1 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 99363 ()

Bugtraq ID: 97377

CVE ID: CVE-2017-7617

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now