Asterisk Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Clients - Im, Chat & Voip
Multiple vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to escalate privileges and cause a DoS (Denial of Service).
A 16 bit SMS message that contains an odd message length value will cause the message decoding loop to run forever. The message buffer is not on the stack but will be overflowed resulting in corrupted memory and an immediate crash.
Impact
- Denial of Service
- Elevation of Privilege
System / Technologies affected
- Asterisk Open Source version 1.8.x, 10.x, 11.x
- Certified Asterisk version 1.8.x, 11.x
- Asterisk with Digiumphones version 10.x-digiumphones
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to the patched versions:
- Asterisk Open Source version 1.8.24.1, 10.12.4, 11.6.1
- Asterisk with Digiumphones version 10.12.4-digiumphones
- Certified Asterisk version 1.8.15-cert4, 11.2-cert3
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with