Bug 2310279 (CVE-2024-42491) - CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI in an incoming SIP request can cause crash
Summary: CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI in an incomi...
Keywords:
Status: NEW
Alias: CVE-2024-42491
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2310292 2310293 2310294
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-05 18:20 UTC by OSIDB Bzimport
Modified: 2024-09-05 20:07 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-09-05 18:20:31 UTC
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations.


Note You need to log in before you can comment on or make changes to this bug.