Vulnerability Name: CVE-2018-17281 (CCN-150220) Assigned: 2018-09-20 Published: 2018-09-20 Updated: 2019-10-03 Summary: There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-400 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2018-17281 Source: CCN Type: Asterisk Project Security Advisory - AST-2018-009Remote crash vulnerability in HTTP websocket upgrade Source: CONFIRM Type: Patch, Vendor Advisoryhttp://downloads.asterisk.org/pub/security/AST-2018-009.html Source: MISC Type: Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html Source: FULLDISC Type: Mailing List, Patch, Third Party Advisory20180920 AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade Source: BID Type: Third Party Advisory, VDB Entry105389 Source: CCN Type: BID-105389Multiple Asterisk Products CVE-2018-17281 Remote Stack Overflow Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1041694 Source: XF Type: UNKNOWNasterisk-cve201817281-dos(150220) Source: CONFIRM Type: Issue Tracking, Third Party Advisoryhttps://issues.asterisk.org/jira/browse/ASTERISK-28013 Source: MLIST Type: Mailing List, Third Party Advisory[debian-lts-announce] 20180927 [SECURITY] [DLA 1523-1] asterisk security update Source: BUGTRAQ Type: Mailing List, Patch, Third Party Advisory20180920 AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade Source: GENTOO Type: Third Party AdvisoryGLSA-201811-11 Source: DEBIAN Type: Third Party AdvisoryDSA-4320 Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2018-17281 Vulnerable Configuration: Configuration 1 :cpe:/a:digium:asterisk:*:*:*:*:lts:*:*:* (Version >= 13.0.0 and <= 13.23.0)OR cpe:/a:digium:asterisk:*:*:*:*:*:*:*:* (Version >= 14.0.0 and <= 14.7.7) OR cpe:/a:digium:asterisk:*:*:*:*:standard:*:*:* (Version >= 15.0.0 and <= 15.6.0) Configuration 2 :cpe:/a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:* OR cpe:/a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
digium asterisk *
digium asterisk *
digium asterisk *
digium certified asterisk 11.6 cert12
digium certified asterisk 11.6 cert13
digium certified asterisk 11.6 cert14
digium certified asterisk 11.6 cert15
digium certified asterisk 11.6 cert16
digium certified asterisk 11.6 cert17
digium certified asterisk 11.6 cert18
digium certified asterisk 13.1 cert3
digium certified asterisk 13.1 cert4
digium certified asterisk 13.1 cert5
digium certified asterisk 13.1 cert6
digium certified asterisk 13.1 cert7
digium certified asterisk 13.1 cert8
digium certified asterisk 13.8 cert1
digium certified asterisk 13.8 cert2
digium certified asterisk 13.8 cert3
digium certified asterisk 13.8 cert4
digium certified asterisk 13.13 cert1
digium certified asterisk 13.13 cert2
digium certified asterisk 13.13 cert3
digium certified asterisk 13.13 cert4
digium certified asterisk 13.13 cert5
digium certified asterisk 13.13 cert6
digium certified asterisk 13.13 cert7
digium certified asterisk 13.13 cert8
digium certified asterisk 13.13 cert9
digium certified asterisk 13.21 cert1
digium certified asterisk 13.21 cert2
debian debian linux 8.0
debian debian linux 9.0