187
VMScore

CVE-2020-28327

Published: 06/11/2020 Updated: 20/11/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.3 | Impact Score: 3.6 | Exploitability Score: 1.6
VMScore: 187
Vector: AV:N/AC:H/Au:S/C:N/I:N/A:P

Vulnerability Summary

A res_pjsip_session crash exists in Asterisk Open Source 13.x prior to 13.37.1, 16.x prior to 16.14.1, 17.x prior to 17.8.1, and 18.x prior to 18.0.1. and Certified Asterisk prior to 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk open source

digium certified asterisk 16.8

Vendor Advisories

Debian Bug report logs - #974712 asterisk: CVE-2020-28327 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 14 Nov 2020 06:30:02 UTC Severity: important Tags: security, upstream Found ...