lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 21 Feb 2018 15:57:19 -0600
From: "Asterisk Security Team" <>
Subject: [FD] AST-2018-005: Crash when large numbers of TCP connections are
 closed suddenly

               Asterisk Project Security Advisory - AST-2018-005

         Product        Asterisk                                              
         Summary        Crash when large numbers of TCP connections are       
                        closed suddenly                                       
    Nature of Advisory  Remote Crash                                          
      Susceptibility    Remote Authenticated Sessions                         
         Severity       Moderate                                              
      Exploits Known    No                                                    
       Reported On      January 24, 2018                                      
       Reported By      Sandro Gauci                                          
        Posted On       February 21, 2018                                     
     Last Updated On    February 21, 2018                                     
     Advisory Contact   gjoseph AT digium DOT com                             
         CVE Name       CVE-2018-7286                                         

    Description  A crash occurs when a number of authenticated INVITE         
                 messages are sent over TCP or TLS and then the connection    
                 is suddenly closed. This issue leads to a segmentation       

    Resolution  A patch to asterisk is available that prevents the crash by   
                locking the underlying transport until a response is sent.    

                               Affected Versions
                Product              Release Series  
         Asterisk Open Source             13.x       All Versions             
         Asterisk Open Source             14.x       All Versions             
         Asterisk Open Source             15.x       All Versions             
          Certified Asterisk             13.18       All Versions             

                                  Corrected In
                 Product                              Release                 
           Asterisk Open Source               13.19.2, 14.7.6, 15.2.2         
            Certified Asterisk                      13.18-cert3               

                                SVN URL                               Revision    Asterisk  
                                                                      13      Asterisk  
                                                                      14      Asterisk  
                                                                      15   Certified 


    Asterisk Project Security Advisories are posted at                                                             
    This document may be superseded by later versions; if so, the latest      
    version will be posted at                                             and                        

                                Revision History
          Date                  Editor                 Revisions Made         
    February 6, 2018   George Joseph             Initial Revision             

               Asterisk Project Security Advisory - AST-2018-005
               Copyright �� 2018 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists