Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6.
{
"cwe_ids": [
"CWE-703"
],
"cna_assigner": "GitHub_M",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/49xxx/CVE-2023-49786.json"
}[
{
"signature_version": "v1",
"target": {
"file": "res/res_rtp_asterisk.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"194195294654478782208597305809601381073",
"299699359499787369045199906154423754698",
"303643776200746914043500213424152276932"
]
},
"source": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05",
"signature_type": "Line",
"id": "CVE-2023-49786-082e6411",
"deprecated": false
},
{
"signature_version": "v1",
"target": {
"function": "__rtp_recvfrom",
"file": "res/res_rtp_asterisk.c"
},
"digest": {
"length": 3200.0,
"function_hash": "117532334825260400145575307068614735389"
},
"source": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05",
"signature_type": "Function",
"id": "CVE-2023-49786-7a4ad233",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-49786.json"