Debian update for asterisk



Published: 2023-02-23
Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2022-23537
CVE-2022-23547
CVE-2022-31031
CVE-2022-37325
CVE-2022-39244
CVE-2022-39269
CVE-2022-42705
CVE-2022-42706
CWE-ID CWE-122
CWE-121
CWE-191
CWE-119
CWE-319
CWE-416
CWE-269
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Debian Linux
Operating systems & Components / Operating system

asterisk (Debian package)
Operating systems & Components / Operating system package or component

Vendor Debian

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU70432

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23537

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when decoding STUN messages. A remote attacker can pass a specially crafted STUN message to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU70479

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23547

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when decoding STUN messages. A remote attacker can pass a specially crafted STUN message to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Stack-based buffer overflow

EUVDB-ID: #VU69571

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31031

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when parsing message as a STUN client. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Integer underflow

EUVDB-ID: #VU69829

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37325

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an integer underflow within the ooh323 module. A remote non-authenticated attacker can initiate a call with a zero length called or calling party number, trigger an integer underflow and crash Asterisk.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU69270

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-39244

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser. A remote attacker can send specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Cleartext transmission of sensitive information

EUVDB-ID: #VU69269

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-39269

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. A remote attacker with ability to intercept network traffic can gain access to sensitive data.

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU69827

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-42705

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within res_pjsip_pubsub.c, res_pjsip_outbound_registration.c, pjsip_transport_events.c files when performing activity on a subscription via a reliable transport at the same time Asterisk is also performing activty on that subscription. A remote user can trigger a use-after-free error and perform a denial of service (DoS) attack.


Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper Privilege Management

EUVDB-ID: #VU69828

Risk: Low

CVSSv3.1: 3.6 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-42706

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges.

The vulnerability exists due to improper privilege management. A remote user with “config” permissions can view files outside of Asterisk directory via GetConfig AMI Action even if “live_dangerously" is set to "no".

Mitigation

Update asterisk package to version 1:16.28.0~dfsg-0+deb11u2.

Vulnerable software versions

Debian Linux: All versions

asterisk (Debian package): before 1:16.28.0~dfsg-0+deb11u2

External links

http://www.debian.org/security/2023/dsa-5358


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###