Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310140380
HistorySep 20, 2017 - 12:00 a.m.

Asterisk RTP/RTCP Information Leak Vulnerability (AST-2017-008)

2017-09-2000:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
71

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.1%

Asterisk is prone to an information leak in RTP/RTCP.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:digium:asterisk";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.140380");
  script_version("2023-12-19T05:05:25+0000");
  script_tag(name:"last_modification", value:"2023-12-19 05:05:25 +0000 (Tue, 19 Dec 2023)");
  script_tag(name:"creation_date", value:"2017-09-20 14:43:21 +0700 (Wed, 20 Sep 2017)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-11-04 01:29:00 +0000 (Sat, 04 Nov 2017)");

  script_cve_id("CVE-2017-14099", "CVE-2017-14603");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Asterisk RTP/RTCP Information Leak Vulnerability (AST-2017-008)");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("General");
  script_dependencies("gb_digium_asterisk_sip_detect.nasl");
  script_mandatory_keys("digium/asterisk/detected");

  script_tag(name:"summary", value:"Asterisk is prone to an information leak in RTP/RTCP.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Insufficient RTCP packet validation could allow reading stale
  buffer contents and when combined with the 'nat' and 'symmetric_rtp' options allow redirecting where
  Asterisk sends the next RTCP report.

  The RTP stream qualification to learn the source address of media always accepted the first RTP
  packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a
  series of packets before accepting the new source address.");

  script_tag(name:"impact", value:"An unauthenticated remote attacker may hijack the media stream.");

  script_tag(name:"affected", value:"Asterisk Open Source versions 11.x, 13.x, 14.x and Certified
  Asterisk versions 11.6 and 13.13.");

  script_tag(name:"solution", value:"Update to version 11.25.3, 13.17.2, 14.6.2, 11.6-cert18,
  13.13-cert6 or later.");

  script_xref(name:"URL", value:"http://downloads.asterisk.org/pub/security/AST-2017-008.html");

  exit(0);
}

include("host_details.inc");
include("revisions-lib.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!version = get_app_version(cpe: CPE, port: port))
  exit(0);

if (version =~ "^11\.") {
  if (version =~ "^11\.6cert") {
    if (revcomp(a: version, b: "11.6cert18") < 0) {
      report = report_fixed_ver(installed_version: version, fixed_version: "11.6-cert18");
      security_message(port: port, data: report, proto: "udp");
      exit(0);
    }
  }
  else {
    if (version_is_less(version: version, test_version: "11.25.3")) {
      report = report_fixed_ver(installed_version: version, fixed_version: "11.25.3");
      security_message(port: port, data: report, proto: "udp");
      exit(0);
    }
  }
}

if (version =~ "^13\.") {
  if (version =~ "^13\.13cert") {
    if (revcomp(a: version, b: "13.13cert6") < 0) {
      report = report_fixed_ver(installed_version: version, fixed_version: "13.13-cert6");
      security_message(port: port, data: report, proto: "udp");
      exit(0);
    }
  }
  else {
    if (version_is_less(version: version, test_version: "13.17.2")) {
      report = report_fixed_ver(installed_version: version, fixed_version: "13.17.2");
      security_message(port: port, data: report, proto: "udp");
      exit(0);
    }
  }
}

if (version =~ "^14\.") {
  if (version_is_less(version: version, test_version: "14.6.2")) {
    report = report_fixed_ver(installed_version: version, fixed_version: "14.6.2");
    security_message(port: port, data: report, proto: "udp");
    exit(0);
  }
}

exit(0);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.021 Low

EPSS

Percentile

89.1%