First published: Thu Mar 17 2011(Updated: )
AST-2011-004 [1] describes a remote crash vulnerability in the Asterisk TCP/TLS server. If a remote, unauthenticated, attacker were to rapidly open and close TCP connections to services using the ast_tcptls_* API, they could cause Asterisk to crash after dereferencing a NULL pointer. This flaw affects 1.6.2.x and 1.8.x, and is corrected in 1.6.2.17.1 and 1.8.3.1. [1] <a href="http://downloads.asterisk.org/pub/security/AST-2011-004.pdf">http://downloads.asterisk.org/pub/security/AST-2011-004.pdf</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | >=1.6.2.0<1.6.2.17.1>=1.8.0<1.8.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-688678 is classified as high due to the potential for a remote denial-of-service attack.
To fix REDHAT-BUG-688678, upgrade Asterisk to a version that is not affected, such as versions later than 1.6.2.17.1 and 1.8.3.1.
Users of Asterisk versions from 1.6.2.0 to 1.6.2.17.1 and 1.8.0 to 1.8.3.1 are affected by REDHAT-BUG-688678.
If REDHAT-BUG-688678 is exploited, it could lead to Asterisk crashing, resulting in a denial of service.
There is no official workaround for REDHAT-BUG-688678, and upgrading to a patched version is recommended.