Advisory Published
Updated

REDHAT-BUG-698916

First published: Fri Apr 22 2011(Updated: )

Asterisk did not limit the number of unauthenticated connections to vulnerable interfaces and did not limit the time unauthenticated clients remain connected to some interfaces. A remote attacker could open many subsequent connections to vulnerable Asterisk interfaces, leading to file descriptor resource exhaustion or possibly to disk space exhaustion (due Asterisk feature of logging failures to open new file descriptors into its log file). References: [1] <a href="http://downloads.asterisk.org/pub/security/AST-2011-005.html">http://downloads.asterisk.org/pub/security/AST-2011-005.html</a> Upstream patches: [2] <a href="http://downloads.asterisk.org/pub/security/AST-2011-005-1.4.diff">http://downloads.asterisk.org/pub/security/AST-2011-005-1.4.diff</a> (against v1.4 branch) [3] <a href="http://downloads.asterisk.org/pub/security/AST-2011-005-1.6.1.diff">http://downloads.asterisk.org/pub/security/AST-2011-005-1.6.1.diff</a> (against v1.6.1 branch) [4] <a href="http://downloads.asterisk.org/pub/security/AST-2011-005-1.6.2.diff">http://downloads.asterisk.org/pub/security/AST-2011-005-1.6.2.diff</a> (against v1.6.2 branch) [5] <a href="http://downloads.asterisk.org/pub/security/AST-2011-005-1.8.diff">http://downloads.asterisk.org/pub/security/AST-2011-005-1.8.diff</a> (against v1.8 branch)

Affected SoftwareAffected VersionHow to fix
Asterisk>1.8>1.4<=1.6.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What vulnerabilities does REDHAT-BUG-698916 address?

    REDHAT-BUG-698916 addresses the lack of limits on unauthenticated connections and their duration on Asterisk interfaces.

  • What is the impact of the vulnerability identified as REDHAT-BUG-698916?

    The impact of REDHAT-BUG-698916 is that a remote attacker could open multiple connections to vulnerable interfaces, potentially exhausting file descriptors.

  • How can I mitigate the risks associated with REDHAT-BUG-698916?

    To mitigate risks associated with REDHAT-BUG-698916, ensure that you apply the security patches provided for the affected Asterisk versions.

  • Which versions of Asterisk are affected by REDHAT-BUG-698916?

    Asterisk versions from 1.4 to 1.6.2 and any versions beyond 1.8 are affected by REDHAT-BUG-698916.

  • What steps should I take to secure my Asterisk installation related to REDHAT-BUG-698916?

    To secure your Asterisk installation related to REDHAT-BUG-698916, limit unauthenticated access and apply recommended security updates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203