Some vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerabilities are caused due to boundary errors within the "decode_open_type()" and "udptl_rx_packet()" functions in main/udptl.c, which can be exploited to cause heap-based and stack-based buffer overflows by e.g. sending specially crafted UDPTL packets to a server performing T.38 pass through or termination.
Successful exploitation requires that the "t38pt_udptl" option is set to "yes" ("no" by default).
The vulnerabilities are reported in Asterisk Open Source Edition prior to versions 188.8.131.52, 184.108.40.206, 220.127.116.11.2, and 18.104.22.168 and Asterisk Business Edition prior to version C.3.6.3.
Solution: Update to a fixed version or apply patches.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org