There is a stack consumption vulnerability in the reshttpwebsocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "9.0"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:digium:asterisk:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:*:*:*:*:standard:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:*"
],
"extracted_events": [
{
"introduced": "13.0.0"
},
{
"last_affected": "13.23.0"
},
{
"introduced": "14.0.0"
},
{
"last_affected": "14.7.7"
},
{
"introduced": "15.0.0"
},
{
"last_affected": "15.6.0"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert12"
},
{
"last_affected": "11.6-cert13"
},
{
"last_affected": "11.6-cert14"
},
{
"last_affected": "11.6-cert15"
},
{
"last_affected": "11.6-cert16"
},
{
"last_affected": "11.6-cert17"
},
{
"last_affected": "11.6-cert18"
},
{
"last_affected": "13.1-cert3"
},
{
"last_affected": "13.1-cert4"
},
{
"last_affected": "13.1-cert5"
},
{
"last_affected": "13.1-cert6"
},
{
"last_affected": "13.1-cert7"
},
{
"last_affected": "13.1-cert8"
},
{
"last_affected": "13.8-cert1"
},
{
"last_affected": "13.8-cert2"
},
{
"last_affected": "13.8-cert3"
},
{
"last_affected": "13.8-cert4"
},
{
"last_affected": "13.13-cert1"
},
{
"last_affected": "13.13-cert2"
},
{
"last_affected": "13.13-cert3"
},
{
"last_affected": "13.13-cert4"
},
{
"last_affected": "13.13-cert5"
},
{
"last_affected": "13.13-cert6"
},
{
"last_affected": "13.13-cert7"
},
{
"last_affected": "13.13-cert8"
},
{
"last_affected": "13.13-cert9"
},
{
"last_affected": "13.21-cert1"
},
{
"last_affected": "13.21-cert2"
}
]
}