Short Name |
VOIP:SIP:ASTERISK-RTP-TYPE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
VOIP |
Keywords |
Digium Asterisk Invalid RTP Payload Type Number Memory Corruption |
Release Date |
2010/10/04 |
Update Number |
1784 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to arbitrary code execution.
Asterisk is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting these issues may allow an attacker to corrupt memory and cause denial-of-service conditions or potentially execute arbitrary code in the context of the application. These issues affect the following versions: Asterisk Open Source prior to 1.4.18.1 and 1.4.19-rc3. Asterisk Open Source prior to 1.6.0-beta6 Asterisk Business Edition prior to C.1.6.1 AsteriskNOW prior to 1.0.2 Asterisk Appliance Developer Kit prior to Asterisk 1.4 revision 109386 s800i (Asterisk Appliance) prior to 1.1.0.2