Learn about CVE-2018-7285, a vulnerability in Asterisk 15.x through 15.2.1 that could lead to a system crash due to incorrect handling of RTP packets. Find out how to mitigate and prevent this issue.
A vulnerability in Asterisk 15.x through 15.2.1 allows for a NULL pointer access issue, potentially leading to a system crash.
Understanding CVE-2018-7285
This CVE involves a vulnerability in Asterisk 15.x through 15.2.1 that could result in a system crash due to incorrect handling of RTP packets.
What is CVE-2018-7285?
The vulnerability in Asterisk 15.x through 15.2.1 allows for a NULL pointer access issue when processing RTP packets. This arises from incorrect assumptions about the existence of certain types of RTP streams.
The Impact of CVE-2018-7285
The vulnerability could lead to a system crash if a payload number corresponds to a codec of a different type than the actual RTP stream, especially when no stream of that type has been negotiated.
Technical Details of CVE-2018-7285
This section provides more in-depth technical details about the vulnerability.
Vulnerability Description
The RTP support in Asterisk maintains a registry of dynamic codecs and their payload numbers. The issue arises when this registry is incorrectly consulted for all packets, including dynamic ones, potentially leading to a crash.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2018-7285, follow these mitigation steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates