vulnerability
FreeBSD: VID-c2ea3b31-9d75-11e7-bb13-001999f8d30b (CVE-2017-14099): asterisk -- RTP/RTCP information leak
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Sep 19, 2017 | Sep 19, 2017 | Dec 10, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Sep 19, 2017
Added
Sep 19, 2017
Modified
Dec 10, 2025
Description
The Asterisk project reports: This is a follow up advisory to AST-2017-005. Insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report. The RTP stream qualification to learn the source address of media always accepted the first RTP packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a series of packets before accepting the new source address. The RTP/RTCP stack will now validate RTCP packets before processing them.
Solutions
freebsd-upgrade-package-asterisk11freebsd-upgrade-package-asterisk13
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.