Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Asterisk DoS Vulnerability (AST-2021-004)
Information
Severity
Severity
Medium
Family
Family
Denial of Service
CVSSv2 Base
CVSSv2 Base
4.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:N/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
3 years ago
Modified
Modified
3 years ago
Summary
Asterisk is prone to a denial of service vulnerability where an unsuspecting user could crash Asterisk with multiple hold/unhold requests.
Insight
Insight
Due to a signedness comparison mismatch, an authenticated WebRTC client could cause a stack overflow and Asterisk crash by sending multiple hold/unhold requests in quick succession.
Affected Software
Affected Software
Asterisk Open Source 16.16.0, 17.9.1, 18.2.0 and 16.8-cert5.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 16.16.1, 17.9.2, 18.2.1, 16.8-cert6 or later.