A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Link | Tags |
---|---|
https://downloads.asterisk.org/pub/security/AST-2022-008.html | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html | mailing list |
https://www.debian.org/security/2023/dsa-5358 | vendor advisory |