var-202110-1256
Vulnerability from variot
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file switch_rtp.c
, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7. FreeSWITCH Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications. FreeSWITCH has an input validation error vulnerability, which arises from network systems or products that do not adequately verify the origin or authenticity of data. Attackers can use forged data to attack. [ES2021-09] FreeSWITCH susceptible to Denial of Service via invalid SRTP packets
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "freeswitch", "scope": "lt", "trust": 1.0, "vendor": "freeswitch", "version": "1.10.7" }, { "model": "freeswitch", "scope": "eq", "trust": 0.8, "vendor": "freeswitch", "version": null }, { "model": "freeswitch", "scope": "eq", "trust": 0.8, "vendor": "freeswitch", "version": "1.10.7" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "cve": "CVE-2021-41105", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-41105", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-397851", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "security-advisories@github.com", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-41105", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-013900", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41105", "trust": 1.0, "value": "MEDIUM" }, { "author": "security-advisories@github.com", "id": "CVE-2021-41105", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-41105", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202110-1799", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-397851", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397851" }, { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "db": "NVD", "id": "CVE-2021-41105" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller\u0027s or the callee\u0027s network. This issue is patched in version 1.10.7. FreeSWITCH Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications. FreeSWITCH has an input validation error vulnerability, which arises from network systems or products that do not adequately verify the origin or authenticity of data. Attackers can use forged data to attack. [ES2021-09] FreeSWITCH susceptible to Denial of Service via invalid SRTP packets", "sources": [ { "db": "NVD", "id": "CVE-2021-41105" }, { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "VULHUB", "id": "VHN-397851" }, { "db": "VULMON", "id": "CVE-2021-41105" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41105", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-013900", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "164639", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202110-1799", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397851", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-41105", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397851" }, { "db": "VULMON", "id": "CVE-2021-41105" }, { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "id": "VAR-202110-1256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397851" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:10:58.923000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FreeSWITCH\u00a0v1.10.7\u00a0Release GitHub", "trust": 0.8, "url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.7" }, { "title": "FreeSWITCH Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168735" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "CNNVD", "id": "CNNVD-202110-1799" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/signalwire/freeswitch/security/advisories/ghsa-jh42-prph-gp36" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2021/oct/43" }, { "trust": 1.7, "url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.7" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41105" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164639/freeswitch-1.10.6-srtp-packet-denial-of-service.html" }, { "trust": 0.1, "url": "http://seclists.org/oss-sec/2021/q4/52" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397851" }, { "db": "VULMON", "id": "CVE-2021-41105" }, { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397851" }, { "db": "VULMON", "id": "CVE-2021-41105" }, { "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "db": "NVD", "id": "CVE-2021-41105" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-25T00:00:00", "db": "VULHUB", "id": "VHN-397851" }, { "date": "2022-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "date": "2021-10-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "date": "2021-10-25T22:15:07.710000", "db": "NVD", "id": "CVE-2021-41105" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-397851" }, { "date": "2022-09-29T06:36:00", "db": "JVNDB", "id": "JVNDB-2021-013900" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1799" }, { "date": "2024-11-21T06:25:28.787000", "db": "NVD", "id": "CVE-2021-41105" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1799" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FreeSWITCH\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013900" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1799" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.