Asterisk Security Team
2017-Dec-01 21:23 UTC
[asterisk-announce] AST-2017-013: DOS Vulnerability in Asterisk chan_skinny
Asterisk Project Security Advisory - AST-2017-013 Product Asterisk Summary DOS Vulnerability in Asterisk chan_skinny Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate Exploits Known Yes Reported On November 30, 2017 Reported By Juan Sacco Posted On December 1, 2017 Last Updated On December 1, 2017 Advisory Contact gjoseph AT digium DOT com CVE Name Description If the chan_skinny (AKA SCCP protocol) channel driver is flooded with certain requests it can cause the asterisk process to use excessive amounts of virtual memory eventually causing asterisk to stop processing requests of any kind. Resolution The chan_skinny driver has been updated to release memory allocations in a correct manner thereby preventing any possiblity of exhaustion. Affected Versions Product Release Series Asterisk Open Source 13.x All Versions Asterisk Open Source 14.x All Versions Asterisk Open Source 15.x All Versions Certified Asterisk 13.13 All Versions Corrected In Product Release Asterisk Open Source 13.18.3, 14.7.3, 15.1.3 Certified Asterisk 13.13-cert8 Patches SVN URL Revision http://downloads.asterisk.org/pub/security/AST-2017-013-13.diff Asterisk 13 http://downloads.asterisk.org/pub/security/AST-2017-013-14.diff Asterisk 14 http://downloads.asterisk.org/pub/security/AST-2017-013-15.diff Asterisk 15 http://downloads.asterisk.org/pub/security/AST-2017-013-13.13.diff Certified Asterisk 13.13 Links https://issues.asterisk.org/jira/browse/ASTERISK-27452 Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2017-013.pdf and http://downloads.digium.com/pub/security/AST-2017-013.html Revision History Date Editor Revisions Made November 30, 2017 George Joseph Initial Revision Asterisk Project Security Advisory - AST-2017-013 Copyright ?? 2017 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
Seemingly Similar Threads
- Asterisk 13.18.3, 14.7.3, 15.1.3 and Certified Asterisk 13.13-cert8 Now Available
- :
- AST-2017-004: Memory exhaustion on short SCCP packets
- AST-2017-009: Buffer overflow in pjproject header parsing can cause crash in Asterisk
- AST-2017-012: Remote Crash Vulnerability in RTCP Stack