Vulnerability Details : CVE-2019-7251
An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation.
Vulnerability category: Overflow
Threat overview for CVE-2019-7251
Top countries where our scanners detected CVE-2019-7251
Top open port discovered on systems with this issue
80
IPs affected by CVE-2019-7251 903
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-7251!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-7251
Probability of exploitation activity in the next 30 days: 0.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 53 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-7251
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-7251
-
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-7251
-
https://downloads.asterisk.org/pub/security/AST-2019-001.html
AST-2019-001Patch;Vendor Advisory
-
https://issues.asterisk.org/jira/browse/ASTERISK-28260
[ASTERISK-28260] Asterisk segfault when rtp negotiation is wrong or fails - Digium/Asterisk JIRAIssue Tracking;Vendor Advisory
Products affected by CVE-2019-7251
- cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*