Asterisk Project Security Advisory - AST-2016-006

Discussion in 'News Aggregator' started by Packet Storm, 9 Sep 2016.

  1. Packet Storm

    Packet Storm Guest

    Asterisk Project Security Advisory - Asterisk can be crashed remotely by sending an ACK to it from an endpoint username that Asterisk does not recognize. Most SIP request types result in an "artificial" endpoint being looked up, but ACKs bypass this lookup. The resulting NULL pointer results in a crash when attempting to determine if ACLs should be applied. This issue was introduced in the Asterisk 13.10 release and only affects that release.

    Continue reading...
     

Share This Page

Loading...