CVE-2018-17281

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
References
Link Resource
http://downloads.asterisk.org/pub/security/AST-2018-009.html Patch Vendor Advisory
http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Sep/31 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/105389 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041694 Third Party Advisory VDB Entry
https://issues.asterisk.org/jira/browse/ASTERISK-28013 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2018/Sep/53 Mailing List Patch Third Party Advisory
https://security.gentoo.org/glsa/201811-11 Third Party Advisory
https://www.debian.org/security/2018/dsa-4320 Third Party Advisory
http://downloads.asterisk.org/pub/security/AST-2018-009.html Patch Vendor Advisory
http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Sep/31 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/105389 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041694 Third Party Advisory VDB Entry
https://issues.asterisk.org/jira/browse/ASTERISK-28013 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2018/Sep/53 Mailing List Patch Third Party Advisory
https://security.gentoo.org/glsa/201811-11 Third Party Advisory
https://www.debian.org/security/2018/dsa-4320 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:lts:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:standard:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:*
cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2018-009.html - Patch, Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2018-009.html - Patch, Vendor Advisory
References () http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2018/Sep/31 - Mailing List, Patch, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Sep/31 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/105389 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105389 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041694 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041694 - Third Party Advisory, VDB Entry
References () https://issues.asterisk.org/jira/browse/ASTERISK-28013 - Issue Tracking, Third Party Advisory () https://issues.asterisk.org/jira/browse/ASTERISK-28013 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2018/Sep/53 - Mailing List, Patch, Third Party Advisory () https://seclists.org/bugtraq/2018/Sep/53 - Mailing List, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201811-11 - Third Party Advisory () https://security.gentoo.org/glsa/201811-11 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4320 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4320 - Third Party Advisory

Information

Published : 2018-09-24 22:29

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17281

Mitre link : CVE-2018-17281

CVE.ORG link : CVE-2018-17281


JSON object : View

Products Affected

debian

  • debian_linux

digium

  • asterisk
  • certified_asterisk
CWE
CWE-400

Uncontrolled Resource Consumption