Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-9E6640FE-BE3A-11E6-B04F-001999F8D30B: asterisk -- Crash on SDP offer or answer from endpoint using Opus

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-9E6640FE-BE3A-11E6-B04F-001999F8D30B: asterisk -- Crash on SDP offer or answer from endpoint using Opus

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/11/2016
Created
07/25/2018
Added
12/09/2016
Modified
09/19/2017

Description

The Asterisk project reports:

If an SDP offer or answer is received with the Opus

codec and with the format parameters separated using a

space the code responsible for parsing will recursively

call itself until it crashes. This occurs as the code

does not properly handle spaces separating the parameters.

This does NOT require the endpoint to have Opus configured

in Asterisk. This also does not require the endpoint to

be authenticated. If guest is enabled for chan_sip or

anonymous in chan_pjsip an SDP offer or answer is still

processed and the crash occurs.

Solution(s)

  • freebsd-upgrade-package-asterisk13

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;