Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-7285
HistoryFeb 22, 2018 - 12:00 a.m.

CVE-2018-7285

2018-02-2200:00:00
ubuntu.com
ubuntu.com
6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.017 Low

EPSS

Percentile

87.8%

A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1.
The RTP support in Asterisk maintains its own registry of dynamic codecs
and desired payload numbers. While an SDP negotiation may result in a codec
using a different payload number, these desired ones are still stored
internally. When an RTP packet was received, this registry would be
consulted if the payload number was not found in the negotiated SDP. This
registry was incorrectly consulted for all packets, even those which are
dynamic. If the payload number resulted in a codec of a different type than
the RTP stream (for example, the payload number resulted in a video codec
but the stream carried audio), a crash could occur if no stream of that
type had been negotiated. This was due to the code incorrectly assuming
that a stream of that type would always exist.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.017 Low

EPSS

Percentile

87.8%