CVE-2020-28327
Vulnerability Scoring
Attack Complexity Details
- Attack Complexity: HIGH IMPACT
- Attack Vector: NETWORK
- Privileges Required: Low Impact
- Scope: UNCHANGED
- User Interaction: NONE
CIA Impact Definition
- Confidentiality:
- Integrity:
- Availability: HIGH IMPACT
CVE-2020-28327 Vulnerability Summary
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.
Access Complexity Graph for CVE-2020-28327
Impact Analysis for CVE-2020-28327
CVE-2020-28327: Detailed Information and External References
EPSS
0.00889
EPSS %
0.82634
References
0.00889
- http://downloads.asterisk.org/pub/security/AST-2020-001.html
- https://issues.asterisk.org/jira/browse/ASTERISK-29057
CWE
CWE-404
CAPEC
0.00889
- Flooding: An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adversary can make in a given period of time. The greater this number, the more likely an attack is to succeed against a given target.
- Excessive Allocation: An adversary causes the target to allocate excessive resources to servicing the attackers' request, thereby reducing the resources available for legitimate services and degrading or denying services. Usually, this attack focuses on memory allocation, but any finite resource on the target could be the attacked, including bandwidth, processing cycles, or other resources. This attack does not attempt to force this allocation through a large number of requests (that would be Resource Depletion through Flooding) but instead uses one or a small number of requests that are carefully formatted to force the target to allocate excessive resources to service this request(s). Often this attack takes advantage of a bug in the target to cause the target to allocate resources vastly beyond what would be needed for a normal request.
- Resource Leak Exposure: An adversary utilizes a resource leak on the target to deplete the quantity of the resource available to service legitimate requests.
- TCP Fragmentation: An adversary may execute a TCP Fragmentation attack against a target with the intention of avoiding filtering rules of network controls, by attempting to fragment the TCP packet such that the headers flag field is pushed into the second fragment which typically is not filtered.
- UDP Fragmentation: An attacker may execute a UDP Fragmentation attack against a target server in an attempt to consume resources such as bandwidth and CPU. IP fragmentation occurs when an IP datagram is larger than the MTU of the route the datagram has to traverse. Typically the attacker will use large UDP packets over 1500 bytes of data which forces fragmentation as ethernet MTU is 1500 bytes. This attack is a variation on a typical UDP flood but it enables more network bandwidth to be consumed with fewer packets. Additionally it has the potential to consume server CPU resources and fill memory buffers associated with the processing and reassembling of fragmented packets.
- ICMP Fragmentation: An attacker may execute a ICMP Fragmentation attack against a target with the intention of consuming resources or causing a crash. The attacker crafts a large number of identical fragmented IP packets containing a portion of a fragmented ICMP message. The attacker these sends these messages to a target host which causes the host to become non-responsive. Another vector may be sending a fragmented ICMP message to a target host with incorrect sizes in the header which causes the host to hang.
- BlueSmacking: An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.
Vulnerable Configurations
-
cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
-
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.1.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.2.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.4.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.5.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.7.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.8.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.9.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.12.0:-:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:-:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.5.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.6.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.7.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.8.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.9.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.10.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.11.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.12.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:16.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:16.14.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.0.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.1.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.2.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.3.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.4.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.5.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.6.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.7.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:17.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:17.8.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:18.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:18.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:sangoma:asterisk:18.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:18.0.0:rc1:*:*:*:*:*:*
CVSS3 Source
nvd@nist.gov
CVSS3 Type
Primary
CVSS3 Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Protect Your Infrastructure: Combat Critical CVE Threats
Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.