| |
Vulnerability CVE-2019-18790
Published: 2019-11-22 Modified: 2019-11-24
Description: |
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x, 16.x, and 17.x, and Certified Asterisk 13.21, because of an incomplete fix for CVE-2019-18351. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. |
Type:
CWE-862 (Missing Authorization)
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.8/10 |
4.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
http://downloads.asterisk.org/pub/security/AST-2019-006.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html
https://www.asterisk.org/downloads/security-advisories
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|