A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://issues.asterisk.org/ | issue tracking vendor advisory |
http://seclists.org/fulldisclosure/2021/Feb/57 | third party advisory mailing list |
https://downloads.asterisk.org/pub/security/AST-2021-001.html | vendor advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-29227 | issue tracking patch vendor advisory exploit |
http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html | third party advisory patch |