Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-14099

Опубликовано: 02 сент. 2017
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 7.5

Описание

In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful timing by an attacker. The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options (for chan_sip and chan_pjsip, respectively) enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default, but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symm...

РелизСтатусПримечание
artful

not-affected

1:13.17.1~dfsg-1ubuntu1
bionic

not-affected

1:13.17.1~dfsg-1ubuntu1
cosmic

not-affected

1:13.17.1~dfsg-1ubuntu1
devel

not-affected

1:13.17.1~dfsg-1ubuntu1
disco

not-affected

1:13.17.1~dfsg-1ubuntu1
eoan

not-affected

1:13.17.1~dfsg-1ubuntu1
esm-apps/bionic

not-affected

1:13.17.1~dfsg-1ubuntu1
esm-apps/focal

not-affected

1:13.17.1~dfsg-1ubuntu1
esm-apps/jammy

not-affected

1:13.17.1~dfsg-1ubuntu1
esm-apps/noble

not-affected

1:13.17.1~dfsg-1ubuntu1

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful timing by an attacker. The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options (for chan_sip and chan_pjsip, respectively) enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default, but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symmetr

CVSS3: 7.5
debian
больше 8 лет назад

In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before ...

CVSS3: 7.5
github
больше 3 лет назад

In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful timing by an attacker. The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options (for chan_sip and chan_pjsip, respectively) enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default, but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symm...

5 Medium

CVSS2

7.5 High

CVSS3