There is a stack consumption vulnerability in the reshttpwebsocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
{
"versions": [
{
"introduced": "13.0.0"
},
{
"last_affected": "13.23.0"
},
{
"introduced": "14.0.0"
},
{
"last_affected": "14.7.7"
},
{
"introduced": "15.0.0"
},
{
"last_affected": "15.6.0"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert12"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert13"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert14"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert15"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert16"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert17"
},
{
"introduced": "0"
},
{
"last_affected": "11.6-cert18"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert3"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert4"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert5"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert6"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert7"
},
{
"introduced": "0"
},
{
"last_affected": "13.1-cert8"
},
{
"introduced": "0"
},
{
"last_affected": "13.8-cert1"
},
{
"introduced": "0"
},
{
"last_affected": "13.8-cert2"
},
{
"introduced": "0"
},
{
"last_affected": "13.8-cert3"
},
{
"introduced": "0"
},
{
"last_affected": "13.8-cert4"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert1"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert2"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert3"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert4"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert5"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert6"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert7"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert8"
},
{
"introduced": "0"
},
{
"last_affected": "13.13-cert9"
},
{
"introduced": "0"
},
{
"last_affected": "13.21-cert1"
},
{
"introduced": "0"
},
{
"last_affected": "13.21-cert2"
}
]
}