
====================================================================

                             CERT-Renater

                 Note d'Information No. 2019/VULN267

_____________________________________________________________________

DATE                : 06/09/2019

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Asterisk Open Source versions
                       prior to 15.7.4, 16.5.1, 13.28.1.

=====================================================================
http://downloads.digium.com/pub/security/AST-2019-004.html
http://downloads.digium.com/pub/security/AST-2019-005.html
_____________________________________________________________________

               Asterisk Project Security Advisory - AST-2019-004

         Product        Asterisk

         Summary        Crash when negotiating for T.38 with a declined

                        stream

    Nature of Advisory  Remote Crash

      Susceptibility    Remote Authenticated Sessions

         Severity       Minor

      Exploits Known    No

       Reported On      August 05, 2019

       Reported By      Alexei Gradinari

        Posted On       September 05, 2019

     Last Updated On    September 4, 2019

     Advisory Contact   kharwell AT sangoma DOT com

         CVE Name       CVE-2019-15297


      Description     When Asterisk sends a re-invite initiating T.38

                      faxing, and the endpoint responds with a declined

                      media stream a crash will then occur in Asterisk.

    Modules Affected  res_pjsip_t38.c


    Resolution  If T.38 faxing is not required then setting the
                “t38_udptl” configuration option on the endpoint to “no”
                disables this functionality. This option defaults to
                “no” so you have to have explicitly set it "yes" to
                potentially be affected by this issue.



                Otherwise, if T.38 faxing is required then Asterisk
                should be upgraded to a fixed version.


                               Affected Versions
                Product              Release Series
         Asterisk Open Source             15.x       All releases

         Asterisk Open Source             16.x       All releases


                                  Corrected In
                    Product                              Release

             Asterisk Open Source                     15.7.4,16.5.1


                                    Patches
                               SVN URL
Revision
   http://downloads.asterisk.org/pub/security/AST-2019-004-15.diff
Asterisk
                                                                   15

   http://downloads.asterisk.org/pub/security/AST-2019-004-16.diff
Asterisk
                                                                   16


       Links     https://issues.asterisk.org/jira/browse/ASTERISK-28495


    Asterisk Project Security Advisories are posted at

    http://www.asterisk.org/security



    This document may be superseded by later versions; if so, the latest

    version will be posted at

    http://downloads.digium.com/pub/security/AST-2019-004.pdf and

    http://downloads.digium.com/pub/security/AST-2019-004.html


                                Revision History
          Date                  Editor                 Revisions Made

    August 28, 2019    Kevin Harwell             Initial revision


               Asterisk Project Security Advisory - AST-2019-004
               Copyright Â© 2019 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory
  in its original, unaltered form.

_____________________________________________________________________

               Asterisk Project Security Advisory - AST-2019-005

          Product         Asterisk

          Summary         Remote Crash Vulnerability in audio
                          transcoding
     Nature of Advisory   Denial of Service

       Susceptibility     Remote Unauthenticated Sessions

          Severity        Minor

       Exploits Known     No

        Reported On       August 7, 2019

        Reported By       Gregory Massel

         Posted On
      Last Updated On     August 26, 2019

      Advisory Contact    Jcolp AT sangoma DOT com

          CVE Name        CVE-2019-15639


      Description     When audio frames are given to the audio
                      transcoding support in Asterisk the number of
                      samples are examined and as part of this a message
                      is output to indicate that no samples are present.
                      A change was done to suppress this message for a
                      particular scenario in which the message was not
                      relevant. This change assumed that information
                      about the origin of a frame will always exist when
                      in reality it may not.


                      This issue presented itself when an RTP packet

                      containing no audio (and thus no samples) was

                      received. In a particular transcoding scenario
                      this audio frame would get turned into a frame
                      with no origin information. If this new frame was
                      then given to the audio transcoding support a
                      crash would occur as no samples and no origin
                      information would be present. The transcoding
                      scenario requires the "genericplc" option to be
                      set to enabled (the default) and a transcoding
                      path from the source format into signed linear and
                      then from signed linear into another format.



                      Note that there may be other scenarios that have
                      not been found which can cause an audio frame with
                      no origin to be given to the audio transcoding
                      support and thus cause a crash.

    Modules Affected  main/translate.c


    Resolution  The "genericplc" option can be disabled in codecs.conf
                to mitigate the described scenario. It is recommended,
                however, that Asterisk be upgraded to one of the listed
                versions or the linked patch applied to protect against
                potential unknown scenarios.


                               Affected Versions
                 Product               Release Series
          Asterisk Open Source              13.x       13.28.0

          Asterisk Open Source              16.x       16.5.0


                                  Corrected In
                     Product                              Release

               Asterisk Open Source                       13.28.1

               Asterisk Open Source                        16.5.1


                                    Patches
                               SVN URL
Revision
   http://downloads.asterisk.org/pub/security/AST-2019-005-13.diff
Asterisk
                                                                   13

   http://downloads.asterisk.org/pub/security/AST-2019-005-16.diff
Asterisk
                                                                   16


       Links     https://issues.asterisk.org/jira/browse/ASTERISK-28499


    Asterisk Project Security Advisories are posted at

    http://www.asterisk.org/security



    This document may be superseded by later versions; if so, the latest

    version will be posted at

    http://downloads.digium.com/pub/security/AST-2019-005.pdf and

    http://downloads.digium.com/pub/security/AST-2019-005.html


                                Revision History
          Date                 Editor                  Revisions Made

    August 26, 2019    Joshua Colp              Initial revision


               Asterisk Project Security Advisory - AST-2019-005
               Copyright Â© 2019 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory
  in its original, unaltered form.




=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================



