![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106461 |
Category: | Denial of Service |
Title: | Asterisk SDP Offer DoS Vulnerability (AST-2016-008) |
Summary: | Asterisk is prone to a SDP offer denial of service (DoS); vulnerability. |
Description: | Summary: Asterisk is prone to a SDP offer denial of service (DoS) vulnerability. Vulnerability Insight: If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs. Vulnerability Impact: An unauthenticated remote attacker may cause a denial of service condition. Affected Software/OS: Asterisk Open Source 13.12.0 prior to 13.13.1 and 14.x prior to 14.2.1. Solution: Update to version 13.13.1, 14.2.1 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-9937 BugTraq ID: 94792 http://www.securityfocus.com/bid/94792 http://www.securitytracker.com/id/1037407 |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |