Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Asterisk DoS Vulnerability (AST-2021-004)

Information

Severity

Severity

Medium

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

4.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Asterisk is prone to a denial of service vulnerability where an unsuspecting user could crash Asterisk with multiple hold/unhold requests.

Insight

Insight

Due to a signedness comparison mismatch, an authenticated WebRTC client could cause a stack overflow and Asterisk crash by sending multiple hold/unhold requests in quick succession.

Affected Software

Affected Software

Asterisk Open Source 16.16.0, 17.9.1, 18.2.0 and 16.8-cert5.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 16.16.1, 17.9.2, 18.2.1, 16.8-cert6 or later.

Common Vulnerabilities and Exposures (CVE)