Vulnerability Name:

CVE-2018-17281 (CCN-150220)

Assigned:2018-09-20
Published:2018-09-20
Updated:2019-10-03
Summary:There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-400
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2018-17281

Source: CCN
Type: Asterisk Project Security Advisory - AST-2018-009
Remote crash vulnerability in HTTP websocket upgrade

Source: CONFIRM
Type: Patch, Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2018-009.html

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html

Source: FULLDISC
Type: Mailing List, Patch, Third Party Advisory
20180920 AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade

Source: BID
Type: Third Party Advisory, VDB Entry
105389

Source: CCN
Type: BID-105389
Multiple Asterisk Products CVE-2018-17281 Remote Stack Overflow Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1041694

Source: XF
Type: UNKNOWN
asterisk-cve201817281-dos(150220)

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
https://issues.asterisk.org/jira/browse/ASTERISK-28013

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20180927 [SECURITY] [DLA 1523-1] asterisk security update

Source: BUGTRAQ
Type: Mailing List, Patch, Third Party Advisory
20180920 AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade

Source: GENTOO
Type: Third Party Advisory
GLSA-201811-11

Source: DEBIAN
Type: Third Party Advisory
DSA-4320

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2018-17281

Vulnerable Configuration:Configuration 1:
  • cpe:/a:digium:asterisk:*:*:*:*:lts:*:*:* (Version >= 13.0.0 and <= 13.23.0)
  • OR cpe:/a:digium:asterisk:*:*:*:*:*:*:*:* (Version >= 14.0.0 and <= 14.7.7)
  • OR cpe:/a:digium:asterisk:*:*:*:*:standard:*:*:* (Version >= 15.0.0 and <= 15.6.0)

  • Configuration 2:
  • cpe:/a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:*
  • OR cpe:/a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.disco:def:2018172810000000
    V
    CVE-2018-17281 on Ubuntu 19.04 (disco) - medium.
    2018-09-24
    oval:com.ubuntu.bionic:def:201817281000
    V
    CVE-2018-17281 on Ubuntu 18.04 LTS (bionic) - medium.
    2018-09-24
    oval:com.ubuntu.cosmic:def:2018172810000000
    V
    CVE-2018-17281 on Ubuntu 18.10 (cosmic) - medium.
    2018-09-24
    oval:com.ubuntu.cosmic:def:201817281000
    V
    CVE-2018-17281 on Ubuntu 18.10 (cosmic) - medium.
    2018-09-24
    oval:com.ubuntu.bionic:def:2018172810000000
    V
    CVE-2018-17281 on Ubuntu 18.04 LTS (bionic) - medium.
    2018-09-24
    oval:com.ubuntu.trusty:def:201817281000
    V
    CVE-2018-17281 on Ubuntu 14.04 LTS (trusty) - medium.
    2018-09-24
    oval:com.ubuntu.xenial:def:2018172810000000
    V
    CVE-2018-17281 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-09-24
    oval:com.ubuntu.xenial:def:201817281000
    V
    CVE-2018-17281 on Ubuntu 16.04 LTS (xenial) - medium.
    2018-09-24
    BACK
    digium asterisk *
    digium asterisk *
    digium asterisk *
    digium certified asterisk 11.6 cert12
    digium certified asterisk 11.6 cert13
    digium certified asterisk 11.6 cert14
    digium certified asterisk 11.6 cert15
    digium certified asterisk 11.6 cert16
    digium certified asterisk 11.6 cert17
    digium certified asterisk 11.6 cert18
    digium certified asterisk 13.1 cert3
    digium certified asterisk 13.1 cert4
    digium certified asterisk 13.1 cert5
    digium certified asterisk 13.1 cert6
    digium certified asterisk 13.1 cert7
    digium certified asterisk 13.1 cert8
    digium certified asterisk 13.8 cert1
    digium certified asterisk 13.8 cert2
    digium certified asterisk 13.8 cert3
    digium certified asterisk 13.8 cert4
    digium certified asterisk 13.13 cert1
    digium certified asterisk 13.13 cert2
    digium certified asterisk 13.13 cert3
    digium certified asterisk 13.13 cert4
    digium certified asterisk 13.13 cert5
    digium certified asterisk 13.13 cert6
    digium certified asterisk 13.13 cert7
    digium certified asterisk 13.13 cert8
    digium certified asterisk 13.13 cert9
    digium certified asterisk 13.21 cert1
    digium certified asterisk 13.21 cert2
    debian debian linux 8.0
    debian debian linux 9.0