Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-FAB87BFF-3CE5-11E7-BF9D-001999F8D30B: asterisk -- Memory exhaustion on short SCCP packets

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-FAB87BFF-3CE5-11E7-BF9D-001999F8D30B: asterisk -- Memory exhaustion on short SCCP packets

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/13/2017
Created
07/25/2018
Added
05/20/2017
Modified
09/19/2017

Description

The Asterisk project reports:

A remote memory exhaustion can be triggered by sending

an SCCP packet to Asterisk system with "chan_skinny"

enabled that is larger than the length of the SCCP header

but smaller than the packet length specified in the header.

The loop that reads the rest of the packet doesn't detect

that the call to read() returned end-of-file before the

expected number of bytes and continues infinitely. The

"partial data" message logging in that tight loop causes

Asterisk to exhaust all available memory.

Solution(s)

  • freebsd-upgrade-package-asterisk13

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;