Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Asterisk RTP/RTCP Information Leak Vulnerability

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

5 years ago

Summary

Asterisk is prone to an information leak in RTP/RTCP.

Insight

Insight

Insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the 'nat' and 'symmetric_rtp' options allow redirecting where Asterisk sends the next RTCP report. The RTP stream qualification to learn the source address of media always accepted the first RTP packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a series of packets before accepting the new source address.

Affected Software

Affected Software

Asterisk Open Source 11.x, 13.x, 14.x and Certified Asterisk 11.6 and 13.13.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Version 11.25.3, 13.17.2, 14.6.2, 11.6-cert18, 13.13-cert6 or later.

Common Vulnerabilities and Exposures (CVE)