VOIP: Digium Asterisk Invalid RTP Payload Type Number Memory Corruption
This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to arbitrary code execution.
Extended Description
Asterisk is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting these issues may allow an attacker to corrupt memory and cause denial-of-service conditions or potentially execute arbitrary code in the context of the application. These issues affect the following versions: Asterisk Open Source prior to 1.4.18.1 and 1.4.19-rc3. Asterisk Open Source prior to 1.6.0-beta6 Asterisk Business Edition prior to C.1.6.1 AsteriskNOW prior to 1.0.2 Asterisk Appliance Developer Kit prior to Asterisk 1.4 revision 109386 s800i (Asterisk Appliance) prior to 1.1.0.2
Affected Products
Asterisk s800i_appliance,Asterisk asterisk
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Asterisk
7.5