Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-28242

An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.

CVE
#dos#js#pdf#auth#jira

Asterisk Project Security Advisory – AST-2020-002

Product

Asterisk

Summary

Outbound INVITE loop on challenge with different nonce.

Nature of Advisory

Denial of Service

Susceptibility

Remote Authenticated Sessions

Severity

Minor

Exploits Known

Yes

Reported On

July 28, 2020

Reported By

Sebastian Damm, Ruslan Lazin

Posted On

November 5, 2020

Last Updated On

November 5, 2020

Advisory Contact

bford AT sangoma DOT com

CVE Name

Description

If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.

Modules Affected

res_pjsip

Resolution

In the fixed versions of Asterisk, a counter has been added that will automatically stop sending INVITEs after reaching the limit.

Affected Versions

Product

Release Series

Asterisk Open Source

13.x

All versions

Asterisk Open Source

16.x

All versions

Asterisk Open Source

17.x

All versions

Asterisk Open Source

18.x

All versions

Certified Asterisk

16.8

All versions

Corrected In

Product

Release

Asterisk Open Source

13.37.1

Asterisk Open Source

16.14.1

Asterisk Open Source

17.8.1

Asterisk Open Source

18.0.1

Certified Asterisk

16.8-cert5

Patches

SVN URL

Revision

http://downloads.asterisk.org/pub/security/AST-2020-002-13.diff

Asterisk 13

http://downloads.asterisk.org/pub/security/AST-2020-002-16.diff

Asterisk 16

http://downloads.asterisk.org/pub/security/AST-2020-002-17.dif

Asterisk 17

http://downloads.asterisk.org/pub/security/AST-2020-002-18.dif

Asterisk 18

http://downloads.asterisk.org/pub/security/AST-2020-002-16.8.diff

Certified Asterisk 16.8-cert5

Links

https://issues.asterisk.org/jira/browse/ASTERISK-29013

Asterisk Project Security Advisories are posted at http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2020-002.pdf and http://downloads.digium.com/pub/security/AST-2020-002.html

Revision History

Date

Editor

Revisions Made

November 5, 2020

Ben Ford

Initial Revision

Asterisk Project Security Advisory -
Copyright © 2019 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907