Improper Check or Handling of Exceptional Conditions Affecting freeswitch package, versions <1.10.11-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.51% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE320-FREESWITCH-7268027
  • published18 Jun 2024
  • disclosed27 Dec 2023

Introduced: 27 Dec 2023

CVE-2023-51443  (opens in a new tab)
CWE-703  (opens in a new tab)

How to fix?

Upgrade Alpine:3.20 freeswitch to version 1.10.11-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream freeswitch package and not the freeswitch package as distributed by Alpine. See How to fix? for Alpine:3.20 relevant fixed versions and status.

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.11, when handling DTLS-SRTP for media setup, FreeSWITCH is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. If an attacker manages to send a ClientHello DTLS message with an invalid CipherSuite (such as TLS_NULL_WITH_NULL_NULL) to the port on the FreeSWITCH server that is expecting packets from the caller, a DTLS error is generated. This results in the media session being torn down, which is followed by teardown at signaling (SIP) level too. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable FreeSWITCH servers for calls that rely on DTLS-SRTP. To address this vulnerability, upgrade FreeSWITCH to 1.10.11 which includes the security fix. The solution implemented is to drop all packets from addresses that have not been validated by an ICE check.

CVSS Base Scores

version 3.1