Asterisk
Project Security Advisory -
Product |
Asterisk |
Summary |
Remote attacker could prematurely tear down SRTP calls |
Nature of Advisory |
Denial of Service |
Susceptibility |
Remote unauthenticated sessions |
Severity |
Moderate |
Exploits Known |
No |
Reported On |
January 22, 2021 |
Reported By |
Alexander Traud |
Posted On |
|
Last Updated On |
|
Advisory Contact |
gjoseph AT sangoma DOT com |
CVE Name |
CVE-2021-26712 |
Description |
An unauthenticated remote attacker could replay SRTP packets which could cause an Asterisk instance configured without strict RTP validation to tear down calls prematurely. |
Modules Affected |
res_srtp.c res_rtp_asterisk.c |
Resolution |
Asterisk now implements SRTP replay protection via a “srtpreplayprotection” option in rtp.conf. The default is “yes” |
Affected Versions |
||
Product |
Release Series |
|
Asterisk Open Source |
13.x |
13.38.1 |
Asterisk Open Source |
16.x |
16.16.0 |
Asterisk Open Source |
17.x |
17.9.1 |
Asterisk Open Source |
18.x |
18.2.0 |
Certified Asterisk |
16.x |
16.8-cert5 |
Corrected In |
|
Product |
Release |
Asterisk Open Source |
13.38.2, 16.16.1, 17.9.2, 18.2.1 |
Certified Asterisk |
16.8-cert6 |
|
|
Patches |
|
Patch URL |
Revision |
https:/downloads.asterisk.org/pub/security/ |
13.38.2 |
https:/downloads.asterisk.org/pub/security/ |
16.16.1 |
https:/downloads.asterisk.org/pub/security/ |
17.9.2 |
https:/downloads.asterisk.org/pub/security/ |
18.2.1 |
https:/downloads.asterisk.org/pub/security/ |
Certified Asterisk 16.8-cert6 |
Links |
https://issues.asterisk.org/jira/browse/ASTERISK-29260 https://downloads.asterisk.org/pub/security/ |
Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later
versions; if so, the latest version will be posted at
https://downloads.digium.com/pub/security/ |
Revision History |
||
Date |
Editor |
Revisions Made |
February 4, 2021 |
George Joseph |
Initial |
February 5, 2021 |
George Joseph |
Added CVE ID |
Asterisk Project Security
Advisory -
Copyright
©
Permission is hereby granted
to distribute and publish this advisory in its original, unaltered
form.