An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peers IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peers name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Asterisk | Digium | 13.0.0 (including) | 13.29.2 (excluding) |
Asterisk | Digium | 16.0.0 (including) | 16.6.2 (excluding) |
Asterisk | Digium | 17.0.0 (including) | 17.0.1 (excluding) |
Certified_asterisk | Digium | 13.21.0 (including) | 13.21.0 (including) |
Certified_asterisk | Digium | 13.21.0-cert1 (including) | 13.21.0-cert1 (including) |
Certified_asterisk | Digium | 13.21.0-cert2 (including) | 13.21.0-cert2 (including) |
Certified_asterisk | Digium | 13.21.0-cert3 (including) | 13.21.0-cert3 (including) |
Certified_asterisk | Digium | 13.21.0-cert4 (including) | 13.21.0-cert4 (including) |
Certified_asterisk | Digium | 13.21.0-rc1 (including) | 13.21.0-rc1 (including) |
Asterisk | Ubuntu | bionic | * |
Asterisk | Ubuntu | disco | * |
Asterisk | Ubuntu | eoan | * |
Asterisk | Ubuntu | trusty | * |
Asterisk | Ubuntu | xenial | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.