SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VoIP)  >   Asterisk Vendors:   Digium (Linux Support Services)
Asterisk PJSIP Channel Driver Contact Header Processing Error Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1040056
SecurityTracker URL:  http://securitytracker.com/id/1040056
CVE Reference:   CVE-2017-17850   (Links to External Site)
Date:  Dec 23 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 13.x, 14.x, 15.x
Description:   A vulnerability was reported in Asterisk. A remote user can cause the target service to crash.

A remote user can send specially crafted SIP data without a contact header to trigger an error in the PJSIP channel driver and cause the service to crash.

On systems with authentication enabled, authentication is required to exploit this vulnerability.

Ross Beer reported this vulnerability.

Impact:   A remote user can cause the target service to crash.
Solution:   The vendor has issued a fix (13.18.5, 14.7.5, 15.1.5).

The vendor advisory is available at:

http://downloads.digium.com/pub/security/AST-2017-014.html

Vendor URL:  downloads.digium.com/pub/security/AST-2017-014.html (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC