No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows the possibility of remote code injection. External References: http://downloads.asterisk.org/pub/security/AST-2017-001.html Upstream patches: [Asterisk 13] http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff [Asterisk 14] http://downloads.asterisk.org/pub/security/AST-2017-001-14.diff Upstream bug: https://issues.asterisk.org/jira/browse/ASTERISK-26897
Created asterisk tracking bugs for this issue: Affects: epel-6 [bug 1439102] Affects: fedora-all [bug 1439103]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.