Bird_banner_small4
Digium Asterisk pjsip_multipart_parse Denial of Service
TSL ID TSL20170523-12
CVE ID(s) Not available.
Severity High
Description

A denial of service vulnerability exists in Digium Asterisk. The vulnerability is due to a processing flaw in the pjsip_multipart_parse function of sip_multipart.c when the chan_pjsip module is used.

A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted SIP request containing multipart data to a vulnerable Asterisk server. Successful exploitation could cause denial-of-service conditions or, in the worst case, arbitrary code execution.

The vendor, Digium, has released the following advisory regarding this vulnerability:

http://downloads.asterisk.org/pub/security/AST-2017-003.txt

Affected Products
  • Digium Asterisk Open Source prior to 13.15.1
  • Digium Asterisk Open Source prior to 14.4.1
  • Digium Certified Asterisk prior to 13.13-cert4
  • Teluu Ltd. PJPROJECT prior to commit 595cac8
CVSS Score Base 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P):
  • Access vector is NETWORK
  • Access complexity is LOW
  • Level of authentication required is NONE
  • Impact of this vulnerability on data confidentiality is NONE
  • Impact of this vulnerability on data integrity is NONE
  • Impact of this vulnerability on data availability is PARTIAL
Temporal 3.9 (E:POC/RL:OF/RC:C):
  • The exploitability level of this vulnerability is PROOF OF CONCEPT
  • The remediation level of this vulnerability is OFFICIAL FIX
  • The report confidence level of this vulnerability is CONFIRMED
References http://downloads.asterisk.org/pub/security/AST-2017-003.txt
https://github.com/EnableSecurity/advisories/tree/master/ES2017-02-asterisk-pjsip-multi-part-crash
Related Threats