vulnerability

FreeBSD: VID-c2ea3b31-9d75-11e7-bb13-001999f8d30b (CVE-2017-14099): asterisk -- RTP/RTCP information leak

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Sep 19, 2017
Added
Sep 19, 2017
Modified
Dec 10, 2025

Description

The Asterisk project reports: This is a follow up advisory to AST-2017-005. Insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report. The RTP stream qualification to learn the source address of media always accepted the first RTP packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a series of packets before accepting the new source address. The RTP/RTCP stack will now validate RTCP packets before processing them.

Solutions

freebsd-upgrade-package-asterisk11freebsd-upgrade-package-asterisk13
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.