Vulnerability identifier: #VU32728
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Asterisk Open Source
Server applications /
Conferencing, Collaboration and VoIP solutions
Vendor: Digium (Linux Support Services)
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones, when anonymous calls are enabled, allow remote attackers to cause a denial of service (resource consumption) by making anonymous calls from multiple sources and consequently adding many entries to the device state cache.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Asterisk Open Source: 1.8.11.0 - 1.8.11.1
External links
https://downloads.asterisk.org/pub/security/AST-2012-015
https://www.debian.org/security/2013/dsa-2605
https://issues.asterisk.org/jira/browse/ASTERISK-20175
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.