|Check Point Reference:||CPAI-2018-1235|
|Date Published:||19 Nov 2019|
|Last Updated:||21 Jan 2020|
|Protection Provided by:||
|Who is Vulnerable?||Asterisk Open Source 15.x before 15.4.1|
|Vulnerability Description||A denial-of-service vulnerability has been reported in Asterisk. The vulnerability is due to improper handling of client abrupt disconnection or client-supplied messages when client is connecting via TLS. A remote user can exploit the vulnerability by abruptly disconnecting or sending specially crafted data via TLS to cause target system entering infinite loop. Successful exploitation can result in denial-of-service conditions.|
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Server Enforcement Violation.
Attack Information: Asterisk Denial of Service (CVE-2018-12228)