asterisk

Page content
  • Author: voroskoi
  • Vulnerable: 1.4.2-2terminus1
  • Unaffected: 1.4.2-2terminus2

Some vulnerabilities have been reported in Asterisk, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

  1. Two boundary errors exist in the T.38 SDP parser of the SIP channel when processing the “T38FaxRateManagement” or “T38FaxUdpEC” SDP parameters within the “process_sdp()” function in chan_sip.c. This can be exploited to cause stack-based buffer overflows by sending a specially crafted SIP packet with overly long SDP parameters. Successful exploitation requires that the “t38_udptl” configuration option is set to “yes”.
  2. A NULL pointer dereference error exists within the authentication mechanism of the Asterisk Remote Management Interface, which can be exploited to crash the service. Successful exploitation requires that the Management Interface is enabled and a user without a password is configured in the manager.conf file. A vulnerability has been reported in Asterisk, which can be exploited by malicious users to disclose potential sensitive information. The vulnerability is caused due to an error within the IAX2 channel driver (chan_iax2) in the processing of text frames. This can be exploited to disclose potentially sensitive heap memory by sending a text frame with content that is not NULL terminated.

CVEs: