CVE-2017-14099
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful timing by an attacker. The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options (for chan_sip and chan_pjsip, respectively) enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default, but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symmetric RTP support, this introduced an avenue where media could be hijacked. Instead of only learning a new address when expected, the new code allowed a new source address to be learned at all times. If a flood of RTP traffic was received, the strict RTP support would allow the new address to provide media, and (with symmetric RTP enabled) outgoing traffic would be sent to this new address, allowing the media to be hijacked. Provided the attacker continued to send traffic, they would continue to receive traffic as well.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
NIST
Change History
6 change records found show changes
CVE Modified by CVE 11/20/2024 10:12:08 PM
Action
Type
Old Value
New Value
Added
Reference
http://downloads.asterisk.org/pub/security/AST-2017-005.html
Added
Reference
http://www.debian.org/security/2017/dsa-3964
Added
Reference
http://www.securitytracker.com/id/1039251
Added
Reference
https://bugs.debian.org/873907
Added
Reference
https://issues.asterisk.org/jira/browse/ASTERISK-27013
Added
Reference
https://rtpbleed.com
Added
Reference
https://security.gentoo.org/glsa/201710-29
CVE Modified by MITRE 5/14/2024 12:21:44 AM
Action
Type
Old Value
New Value
CVE Modified by MITRE 11/03/2017 9:29:35 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.debian.org/security/2017/dsa-3964 [No Types Assigned]
CVE Modified by MITRE 10/30/2017 9:29:03 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/201710-29 [No Types Assigned]
Initial Analysis by NIST 9/20/2017 3:25:33 PM
Action
Type
Old Value
New Value
Added
CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Added
CVSS V2
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Added
CWE
CWE-200
Added
CPE Configuration
Record truncated, showing 2048 of 4045 characters.
View Entire Change Record
OR
*cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:11
Added
CPE Configuration
Record truncated, showing 2048 of 3044 characters.
View Entire Change Record
OR
*cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*
*cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:13.12.1:*:*
Added
CPE Configuration
OR
*cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*
*cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*
*cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*
Changed
Reference Type
http://downloads.asterisk.org/pub/security/AST-2017-005.html No Types Assigned
http://downloads.asterisk.org/pub/security/AST-2017-005.html Vendor Advisory
Changed
Reference Type
http://www.securitytracker.com/id/1039251 No Types Assigned
http://www.securitytracker.com/id/1039251 Third Party Advisory, VDB Entry
Changed
Reference Type
https://bugs.debian.org/873907 No Types Assigned
https://bugs.debian.org/873907 Issue Tracking, Patch, Third Party Advisory
Changed
Reference Type
https://issues.asterisk.org/jira/browse/ASTERISK-27013 No Types Assigned
https://issues.asterisk.org/jira/browse/ASTERISK-27013 Issue Tracking, Patch, Third Party Advisory
Changed
Reference Type
https://rtpbleed.com No Types Assigned
https://rtpbleed.com Third Party Advisory
CVE Modified by MITRE 9/03/2017 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securitytracker.com/id/1039251 [No Types Assigned]
Quick Info
CVE Dictionary Entry: CVE-2017-14099 NVD
Published Date: 09/02/2017 NVD
Last Modified: 04/19/2025
Source: MITRE