Asterisk DoS Vulnerability (AST-2021-004)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Asterisk is prone to a denial of service vulnerability where an unsuspecting user could crash Asterisk with multiple hold/unhold requests.
Insight
Insight
Due to a signedness comparison mismatch, an authenticated WebRTC client could cause a stack overflow and Asterisk crash by sending multiple hold/unhold requests in quick succession.
Affected Software
Affected Software
Asterisk Open Source 16.16.0, 17.9.1, 18.2.0 and 16.8-cert5.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 16.16.1, 17.9.2, 18.2.1, 16.8-cert6 or later.
Common Vulnerabilities and Exposures (CVE)
Scan your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.
Get Started for Free