There is a stack overflow vulnerability in the res_http_websocket.so module of Asterisk that allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. The attacker’s request causes Asterisk to run out of stack space and crash. References: https://issues.asterisk.org/jira/browse/ASTERISK-28013 http://downloads.asterisk.org/pub/security/AST-2018-009-13.diff http://downloads.asterisk.org/pub/security/AST-2018-009-14.diff http://downloads.asterisk.org/pub/security/AST-2018-009-15.diff http://downloads.asterisk.org/pub/security/AST-2018-009-13.21.diff
Created asterisk tracking bugs for this issue: Affects: epel-6 [bug 1632479] Affects: fedora-all [bug 1632478]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.