RULE(RULE ID:2205155)

Rule General Information
Release Date: 2019-06-06
Rule Name: Digium Asterisk PJSIP Contact Header Denial of Service Vulnerability (CVE-2017-17850)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.
Impact: An attacker can launch a denial of service attack by exploiting the vulnerability successfully.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityTrackerID:1040056
http://downloads.asterisk.org/pub/security/AST-2017-014.html
https://issues.asterisk.org/jira/browse/ASTERISK-27480
https://security.gentoo.org/glsa/201811-11
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://downloads.asterisk.org/pub/security/AST-2017-014.html