Show plain JSON{"id": "CVE-2024-42491", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.1}]}, "published": "2024-09-05T18:15:05.707", "references": [{"url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4", "source": "security-advisories@github.com"}, {"url": "https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742", "source": "security-advisories@github.com"}, {"url": "https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2", "source": "security-advisories@github.com"}, {"url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8", "source": "security-advisories@github.com"}, {"url": "https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0", "source": "security-advisories@github.com"}, {"url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9", "source": "security-advisories@github.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-252"}, {"lang": "en", "value": "CWE-476"}]}], "descriptions": [{"lang": "en", "value": "Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations."}, {"lang": "es", "value": "Asterisk es una centralita privada (PBX) de c\u00f3digo abierto. En versiones anteriores a las 18.24.3, 20.9.3 y 21.4.3 de Asterisk y las versiones 18.9-cert12 y 20.7-cert2 de certificate-asterisk, si Asterisk intenta enviar una solicitud SIP a una URI cuya parte de host comienza con `.1` o `[.1]`, y res_resolver_unbound est\u00e1 cargado, Asterisk se bloquear\u00e1 con un SEGV. Para recibir un parche, los usuarios deben actualizar a una de las siguientes versiones: 18.24.3, 20.9.3, 21.4.3, certificate-18.9-cert12, certificate-20.7-cert2. Hay dos workarounds disponibles. Deshabilite res_resolver_unbound configurando `noload = res_resolver_unbound.so` en modules.conf, o configure `rewrite_contact = yes` en todos los endpoints PJSIP. NOTA: Esto puede no ser apropiado para todas las configuraciones de Asterisk."}], "lastModified": "2024-09-06T12:08:21.290", "sourceIdentifier": "security-advisories@github.com"}