CVE-2018-17281

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.

References

http://downloads.asterisk.org/pub/security/AST-2018-009.html

http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html

http://seclists.org/fulldisclosure/2018/Sep/31

http://www.securityfocus.com/bid/105389

http://www.securitytracker.com/id/1041694

https://issues.asterisk.org/jira/browse/ASTERISK-28013

https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html

https://seclists.org/bugtraq/2018/Sep/53

https://security.gentoo.org/glsa/201811-11

https://www.debian.org/security/2018/dsa-4320

Details

Source: MITRE

Published: 2018-09-24

Updated: 2019-10-03

Type: CWE-400

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:digium:asterisk:*:*:*:*:lts:*:*:* versions from 13.0.0 to 13.23.0 (inclusive)

cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.7.7 (inclusive)

cpe:2.3:a:digium:asterisk:*:*:*:*:standard:*:*:* versions from 15.0.0 to 15.6.0 (inclusive)

Configuration 2

OR

cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:*

cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
119131GLSA-201811-11 : Asterisk: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
118158Debian DSA-4320-1 : asterisk - security updateNessusDebian Local Security Checks
high
117810Debian DLA-1523-1 : asterisk security updateNessusDebian Local Security Checks
high
117808Asterisk 13.x < 13.23.1 / 14.x < 14.7.8 / 15.x < 15.6.1 / 13.21 < 13.21-cert3 HTTP Websocket Stack Overflow (AST-2018-009)NessusMisc.
high
117651FreeBSD : asterisk -- Remote crash vulnerability in HTTP websocket upgrade (77f67b46-bd75-11e8-81b6-001999f8d30b)NessusFreeBSD Local Security Checks
high