Bug 1327441 (AST-2016-005)

Summary: asterisk: TCP DoS in PJProject
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: g.devel, itamar, jsmith.fedora, lmadsen, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: asterisk 13.8.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:50:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1327435, 1327436    
Bug Blocks:    

Description Andrej Nemec 2016-04-15 07:38:17 UTC
PJProject has a limit on the number of TCP connections that  
it can accept. Furthermore, PJProject does not close TCP     
connections it accepts. By default, this value is            
approximately 60.                                            
                                                                              
An attacker can deplete the number of allowed TCP            
connections by opening TCP connections and sending no data   
to Asterisk.                                                 
                                                                              
If PJProject has been compiled in debug mode, then once the  
number of allowed TCP connections has been depleted, the     
next attempted TCP connection to Asterisk will crash due to  
an assertion in PJProject.                                   
                                                                              
If PJProject has not been compiled in debug mode, then any   
further TCP connection attempts will be rejected. This       
makes Asterisk unable to process TCP SIP traffic.            
                                                                              
Note that this only affects TCP/TLS, since UDP is            
connectionless. Also note that this does not affect          
chan_sip.

External references:

http://downloads.asterisk.org/pub/security/AST-2016-005.html

Comment 1 Product Security DevOps Team 2019-06-08 02:50:47 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.