First published: Mon Sep 24 2018(Updated: )
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/asterisk | <=1:13.22.0~dfsg-2<=1:13.14.1~dfsg-1 | 1:13.23.1~dfsg-1 1:13.14.1~dfsg-2+deb9u4 |
Digium Asterisk | >=13.0.0<=13.23.0 | |
Digium Asterisk | >=14.0.0<=14.7.7 | |
Digium Asterisk | >=15.0.0<=15.6.0 | |
Digium Certified Asterisk | =11.6-cert12 | |
Digium Certified Asterisk | =11.6-cert13 | |
Digium Certified Asterisk | =11.6-cert14 | |
Digium Certified Asterisk | =11.6-cert15 | |
Digium Certified Asterisk | =11.6-cert16 | |
Digium Certified Asterisk | =11.6-cert17 | |
Digium Certified Asterisk | =11.6-cert18 | |
Digium Certified Asterisk | =13.1-cert3 | |
Digium Certified Asterisk | =13.1-cert4 | |
Digium Certified Asterisk | =13.1-cert5 | |
Digium Certified Asterisk | =13.1-cert6 | |
Digium Certified Asterisk | =13.1-cert7 | |
Digium Certified Asterisk | =13.1-cert8 | |
Digium Certified Asterisk | =13.8-cert1 | |
Digium Certified Asterisk | =13.8-cert2 | |
Digium Certified Asterisk | =13.8-cert3 | |
Digium Certified Asterisk | =13.8-cert4 | |
Digium Certified Asterisk | =13.13-cert1 | |
Digium Certified Asterisk | =13.13-cert2 | |
Digium Certified Asterisk | =13.13-cert3 | |
Digium Certified Asterisk | =13.13-cert4 | |
Digium Certified Asterisk | =13.13-cert5 | |
Digium Certified Asterisk | =13.13-cert6 | |
Digium Certified Asterisk | =13.13-cert7 | |
Digium Certified Asterisk | =13.13-cert8 | |
Digium Certified Asterisk | =13.13-cert9 | |
Digium Certified Asterisk | =13.21-cert1 | |
Digium Certified Asterisk | =13.21-cert2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/asterisk | 1:16.2.1~dfsg-1+deb10u2 1:16.28.0~dfsg-0+deb10u3 1:16.28.0~dfsg-0+deb11u3 1:20.4.0~dfsg+~cs6.13.40431414-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this stack consumption vulnerability is CVE-2018-17281.
Asterisk versions through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0, as well as Certified Asterisk through 13.21-cert2, are affected by this vulnerability.
The severity rating of CVE-2018-17281 is high with a CVSS score of 7.5.
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to upgrade the connection, causing Asterisk to crash.
Yes, upgrading to Asterisk versions 13.23.1 or higher, 14.7.8 or higher, 15.6.1 or higher, or applying the necessary patches provided by the vendor can mitigate this vulnerability.