Asterisk Project Security Advisory - AST-2019-002

Product

Asterisk

Summary

Remote crash vulnerability with MESSAGE messages

Nature of Advisory

Denial Of Service

Susceptibility

Remote Authenticated Sessions

Severity

Low

Exploits Known

No

Reported On

June 13, 2019

Reported By

Gil Richard

Posted On

June 14,2019

Last Updated On

George Joseph

Advisory Contact

gjoseph AT digium DOT com

CVE Name

CVE-2019-12827



Description

A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash.


Resolution

Upgrade Asterisk to a fixed version.


Affected Versions

Product

Release Series


Certified Asterisk

13.21-cert

All releases

Asterisk Open Source

13.x

All releases

Asterisk Open Source

15.x

All releases

Asterisk Open Source

16.x

All releases


Corrected In

Product

Release

Certified Asterisk

13.21-cert4

Asterisk Open Source

13.27.1

Asterisk Open Source

15.7.3

Asterisk Open Source

16.4.1


Patches

SVN URL

Revision

http://downloads.asterisk.org/pub/security/AST-2019-002-13.21.diff

Certified Asterisk 13.21-cert4

http://downloads.asterisk.org/pub/security/AST-2019-002-13.diff

Asterisk 13

http://downloads.asterisk.org/pub/security/AST-2019-002-15.diff

Asterisk 15

http://downloads.asterisk.org/pub/security/AST-2019-002-16.diff

Asterisk 16



Links

https://issues.asterisk.org/jira/browse/ASTERISK-28447


Asterisk Project Security Advisories are posted at http://www.asterisk.org/security

This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2019-002.pdf and http://downloads.digium.com/pub/security/AST-2019-002.html


Revision History

Date

Editor

Revisions Made

June 14, 2019

George Joseph

Initial revision


Asterisk Project Security Advisory - AST-2019-002
Copyright © 2018 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.