Asterisk 13.29.2, 16.6.2, 17.0.1, 13.21-cert5 Now Available (Security Release)

Asterisk 13.29.2, 16.6.2, 17.0.1, 13.21-cert5 Now Available (Security Release)

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16 and 17, and Certified Asterisk 13.21. The available releases are
released as versions 13.29.2, 16.6.2, 17.0.1 and 13.21-cert5.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/telephony/asterisk/releases
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases

The following security vulnerabilities were resolved in these versions:

    • AST-2019-006: SIP request can change address of a SIP peer.
      A SIP request can be sent to Asterisk that can change a SIP peer’s IP
      address. A REGISTER does not need to occur, and calls can be hijacked as a
      result. The only thing that needs to be known is the peer’s name;
      authentication details such as passwords do not need to be known. This
      vulnerability is only exploitable when the “nat” option is set to the
      default, or “auto_force_rport”.

 

    • AST-2019-007: AMI user could execute system commands.
      A remote authenticated Asterisk Manager Interface (AMI) user without
      “system” authorization could use a specially crafted “Originate” AMI
      request to execute arbitrary system commands.

 

  • AST-2019-008: Re-invite with T.38 and malformed SDP causes crash.
    If Asterisk receives a re-invite initiating T.38 faxing and has a port of 0
    and no c line in the SDP, a crash will occur.

For a full list of changes in the current releases, please see the ChangeLogs:

ChangeLog-13.29.2
ChangeLog-16.6.2
ChangeLog-17.0.1
ChangeLog-certified-13.21-cert5

The security advisories are available at:

AST-2019-006.pdf
AST-2019-007.pdf
AST-2019-008.pdf

Thank you for your continued support of Asterisk!

What can we help you find?