CVE-2021-41105

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2021/Oct/43 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2021/Oct/43 - Exploit, Mailing List, Third Party Advisory
References () https://github.com/signalwire/freeswitch/releases/tag/v1.10.7 - Release Notes, Third Party Advisory () https://github.com/signalwire/freeswitch/releases/tag/v1.10.7 - Release Notes, Third Party Advisory
References () https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36 - Exploit, Third Party Advisory () https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36 - Exploit, Third Party Advisory

12 Aug 2022, 14:48

Type Values Removed Values Added
CWE NVD-CWE-noinfo NVD-CWE-Other

28 Oct 2021, 19:45

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo
CPE cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.5
v2 : 5.0
v3 : 7.5
References (MISC) https://github.com/signalwire/freeswitch/releases/tag/v1.10.7 - (MISC) https://github.com/signalwire/freeswitch/releases/tag/v1.10.7 - Release Notes, Third Party Advisory
References (CONFIRM) https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36 - (CONFIRM) https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36 - Exploit, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/43 - (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/43 - Exploit, Mailing List, Third Party Advisory

26 Oct 2021, 17:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/43 -

25 Oct 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-25 22:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41105

Mitre link : CVE-2021-41105

CVE.ORG link : CVE-2021-41105


JSON object : View

Products Affected

freeswitch

  • freeswitch
CWE
CWE-20

Improper Input Validation

NVD-CWE-Other