ID

VAR-202110-1256


CVE

CVE-2021-41105


TITLE

FreeSWITCH  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-013900

DESCRIPTION

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7. FreeSWITCH Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications. FreeSWITCH has an input validation error vulnerability, which arises from network systems or products that do not adequately verify the origin or authenticity of data. Attackers can use forged data to attack. [ES2021-09] FreeSWITCH susceptible to Denial of Service via invalid SRTP packets

Trust: 1.8

sources: NVD: CVE-2021-41105 // JVNDB: JVNDB-2021-013900 // VULHUB: VHN-397851 // VULMON: CVE-2021-41105

AFFECTED PRODUCTS

vendor:freeswitchmodel:freeswitchscope:ltversion:1.10.7

Trust: 1.0

vendor:freeswitchmodel:freeswitchscope:eqversion: -

Trust: 0.8

vendor:freeswitchmodel:freeswitchscope:eqversion:1.10.7

Trust: 0.8

sources: JVNDB: JVNDB-2021-013900 // NVD: CVE-2021-41105

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-41105
value: MEDIUM

Trust: 1.0

security-advisories@github.com: CVE-2021-41105
value: HIGH

Trust: 1.0

NVD: CVE-2021-41105
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202110-1799
value: HIGH

Trust: 0.6

VULHUB: VHN-397851
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-41105
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-397851
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

security-advisories@github.com: CVE-2021-41105
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2021-013900
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-397851 // JVNDB: JVNDB-2021-013900 // CNNVD: CNNVD-202110-1799 // NVD: CVE-2021-41105 // NVD: CVE-2021-41105

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-20

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-013900 // NVD: CVE-2021-41105

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202110-1799

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202110-1799

PATCH

title:FreeSWITCH v1.10.7 Release GitHuburl:https://github.com/signalwire/freeswitch/releases/tag/v1.10.7

Trust: 0.8

title:FreeSWITCH Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168735

Trust: 0.6

sources: JVNDB: JVNDB-2021-013900 // CNNVD: CNNVD-202110-1799

EXTERNAL IDS

db:NVDid:CVE-2021-41105

Trust: 3.4

db:JVNDBid:JVNDB-2021-013900

Trust: 0.8

db:PACKETSTORMid:164639

Trust: 0.7

db:CNNVDid:CNNVD-202110-1799

Trust: 0.7

db:VULHUBid:VHN-397851

Trust: 0.1

db:VULMONid:CVE-2021-41105

Trust: 0.1

sources: VULHUB: VHN-397851 // VULMON: CVE-2021-41105 // JVNDB: JVNDB-2021-013900 // CNNVD: CNNVD-202110-1799 // NVD: CVE-2021-41105

REFERENCES

url:https://github.com/signalwire/freeswitch/security/advisories/ghsa-jh42-prph-gp36

Trust: 1.7

url:http://seclists.org/fulldisclosure/2021/oct/43

Trust: 1.7

url:https://github.com/signalwire/freeswitch/releases/tag/v1.10.7

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-41105

Trust: 1.4

url:https://packetstormsecurity.com/files/164639/freeswitch-1.10.6-srtp-packet-denial-of-service.html

Trust: 0.6

url:http://seclists.org/oss-sec/2021/q4/52

Trust: 0.1

sources: VULHUB: VHN-397851 // VULMON: CVE-2021-41105 // JVNDB: JVNDB-2021-013900 // CNNVD: CNNVD-202110-1799 // NVD: CVE-2021-41105

SOURCES

db:VULHUBid:VHN-397851
db:VULMONid:CVE-2021-41105
db:JVNDBid:JVNDB-2021-013900
db:CNNVDid:CNNVD-202110-1799
db:NVDid:CVE-2021-41105

LAST UPDATE DATE

2024-11-23T22:10:58.923000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-397851date:2022-08-12T00:00:00
db:JVNDBid:JVNDB-2021-013900date:2022-09-29T06:36:00
db:CNNVDid:CNNVD-202110-1799date:2022-08-15T00:00:00
db:NVDid:CVE-2021-41105date:2024-11-21T06:25:28.787

SOURCES RELEASE DATE

db:VULHUBid:VHN-397851date:2021-10-25T00:00:00
db:JVNDBid:JVNDB-2021-013900date:2022-09-29T00:00:00
db:CNNVDid:CNNVD-202110-1799date:2021-10-25T00:00:00
db:NVDid:CVE-2021-41105date:2021-10-25T22:15:07.710