5
CVSSv2

CVE-2018-19278

Published: 14/11/2018 Updated: 30/12/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x prior to 15.6.2 and 16.x prior to 16.0.1 allows remote malicious users to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digium asterisk 15.6.0

digium asterisk 15.5.0

digium asterisk 15.4.0

digium asterisk 15.2.1

digium asterisk 15.1.4

digium asterisk 15.1.2

digium asterisk 15.3.0

digium asterisk 15.1.0

digium asterisk 15.0.0

digium asterisk 16.0.1

digium asterisk 16.0.0

digium asterisk 15.2.2

digium asterisk 15.2.0

digium asterisk 15.1.5

digium asterisk 15.6.1

digium asterisk 15.4.1

digium asterisk 15.1.3

Github Repositories

Tool to exploit CVE-2018-7284 and CVE-2018-19278

astDoS Tool to exploit CVE-2018-7284 and CVE-2018-19278 Usage This tool is used as a command astDoSpy [-h] [-a {1,2}] [-sA SERVER_IP] [-sP SERVER_PORT] [-u USER] [-p PASSWD] [-sub SUBUSER] [-dA DNS_IP] [-dP DNS_PORT] [-v [VERSION]] DoS attack against Astersisk, CVE-2018-7284 and CVE-2018-19278 optional arguments: -h, --help sho