Discover the impact of CVE-2020-35652 in Sangoma Asterisk versions before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. Learn about the exploitation mechanism and mitigation steps.
An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or when a SIP 181 response is received that contains a tel-uri in the Diversion header.
Understanding CVE-2020-35652
This CVE identifies a vulnerability in Sangoma Asterisk versions that can lead to a crash under specific conditions.
What is CVE-2020-35652?
The CVE-2020-35652 vulnerability is related to the handling of SIP messages in Sangoma Asterisk, potentially resulting in a crash when certain types of SIP messages are received.
The Impact of CVE-2020-35652
The vulnerability can be exploited to cause a crash in the affected versions of Sangoma Asterisk, potentially leading to service disruption or denial of service.
Technical Details of CVE-2020-35652
This section provides more technical insights into the vulnerability.
Vulnerability Description
The issue occurs in res_pjsip_diversion.c in Sangoma Asterisk versions before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0, specifically when handling SIP messages with certain headers.
Affected Systems and Versions
Exploitation Mechanism
The crash can be triggered by receiving a SIP message with a History-Info header containing a tel-uri or a SIP 181 response with a tel-uri in the Diversion header.
Mitigation and Prevention
To address CVE-2020-35652, follow these mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates