First published: Tue Jun 12 2018(Updated: )
An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk Open Source | >=15.0<15.4.1 | |
Sangoma Asterisk | >=15.0<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12228 is a vulnerability discovered in Asterisk Open Source 15.x before version 15.4.1, which can cause the system to become unusable.
CVE-2018-12228 affects Asterisk when connected via TCP/TLS, where if the client abruptly disconnects or sends a specially crafted message, it can cause an infinite loop and render the system unusable.
The severity of CVE-2018-12228 is medium with a severity value of 6.5.
To fix CVE-2018-12228, users should update to Asterisk Open Source version 15.4.1 or later.
Yes, the references for CVE-2018-12228 include http://downloads.asterisk.org/pub/security/AST-2018-007.html, http://www.securityfocus.com/bid/104457, and https://issues.asterisk.org/jira/browse/ASTERISK-27807.