Condorlab

Asterisk – Remote crash in res_pjsip_diversion – History-Info header


Advisory IDRSN-SIP-1658



Vulnerability Information

An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0.


Technical Information

A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or when a SIP 181 response is received that contains a tel-uri in the Diversion header.


Solutions

The UCTM solution from RedShift Networks provides the industry’s first complete security solution developed to secure VOIP networks, endpoints and applications. His research team Condor-Labs.com is constantly looking for new attack patterns, advanced penetration testing methods, vulnerability identification and deployment of new signatures for constantly subscribed clients. For more information visit www.redshiftnetworks.com


External Resources

https://issues.asterisk.org/jira/browse/ASTERISK-29219

https://downloads.asterisk.org/pub/security/AST-2020-004.html
https://downloads.asterisk.org/pub/security/AST-2020-003.html

Common Vulnerabilities and Exposures (CVE)

https://nvd.nist.gov/vuln/detail/CVE-2020-35652