// For flags

CVE-2020-28327

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.

Se detectó un bloqueo de res_pjsip_session en Asterisk Open Source versiones 13.x anteriores a 13.37.1, versiones 16.x anteriores a 16.14.1, versiones 17.x anteriores a 17.8.1 y versiones 18.x anteriores a 18.0.1. y Certified Asterisk anteriores a 16.8-cert5. Tras recibir una nueva invitación SIP, Asterisk no devolvió el cuadro de diálogo diseñado bloqueado o referenciado. Esto provocó una brecha entre la creación del objeto de diálogo y su próximo uso por parte del subproceso que lo creó. Dependiendo de algunas circunstancias y tiempos fuera de lo nominal, fue posible que otro subproceso liberara dicho cuadro de diálogo en este espacio. Asterisk podría bloquearse cuando el objeto de diálogo, o cualquiera de sus objetos dependientes, fueran desreferenciados o accedidos a continuación por el subproceso de creación inicial. Sin embargo, tome en cuenta que este bloqueo solo puede ocurrir cuando se usa un protocolo orientado a la conexión (por ejemplo, TCP o TLS, pero no UDP) para el transporte SIP. Además, el cliente remoto debe estar autenticado, o Asterisk debe estar configurado para llamadas anónimas

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-11-06 CVE Reserved
  • 2020-11-06 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-08-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-404: Improper Resource Shutdown or Release
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asterisk
Search vendor "Asterisk"
Open Source
Search vendor "Asterisk" for product "Open Source"
>= 13.0.0 < 13.37.1
Search vendor "Asterisk" for product "Open Source" and version " >= 13.0.0 < 13.37.1"
-
Affected
Asterisk
Search vendor "Asterisk"
Open Source
Search vendor "Asterisk" for product "Open Source"
>= 16.0.0 < 16.14.1
Search vendor "Asterisk" for product "Open Source" and version " >= 16.0.0 < 16.14.1"
-
Affected
Asterisk
Search vendor "Asterisk"
Open Source
Search vendor "Asterisk" for product "Open Source"
>= 17.0.0 < 17.8.1
Search vendor "Asterisk" for product "Open Source" and version " >= 17.0.0 < 17.8.1"
-
Affected
Asterisk
Search vendor "Asterisk"
Open Source
Search vendor "Asterisk" for product "Open Source"
>= 18.0.0 < 18.0.1
Search vendor "Asterisk" for product "Open Source" and version " >= 18.0.0 < 18.0.1"
-
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
-
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert1-rc1
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert1-rc2
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert1-rc3
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert1-rc4
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert2
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert3
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert4
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert4-rc1
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert4-rc2
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert4-rc3
Affected
Digium
Search vendor "Digium"
Certified Asterisk
Search vendor "Digium" for product "Certified Asterisk"
16.8
Search vendor "Digium" for product "Certified Asterisk" and version "16.8"
cert4-rc4
Affected