Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@0?distro=sid
purl pkg:deb/debian/asterisk@0?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (22)
Vulnerability Summary Aliases
VCID-1bxe-fg62-qugd The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package. CVE-2014-6609
VCID-1t3u-22gq-qucr Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1. CVE-2024-35190
VCID-2xc3-aqh8-cubn main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario. CVE-2019-15639
VCID-3r26-8d9e-aqdm asterisk: remote crash in SIP channel driver (AST-2009-002) CVE-2009-0871
VCID-4658-u85z-zqhh The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x before 12.3.1, when sub_min_expiry is set to zero, allows remote attackers to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to the device. CVE-2014-4045
VCID-81tr-5yzn-m7ap chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948. CVE-2012-3553
VCID-a4na-u27r-sfc5 The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout. CVE-2014-4048
VCID-agez-w3xn-63bt Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2288
VCID-an47-cxfn-77e8 Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code. CVE-2013-2685
VCID-ge7t-fqyp-vyhz Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26713
VCID-jez3-sw2r-r3d6 An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs. CVE-2016-9937
VCID-mmng-tcuj-wkhu An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable. CVE-2018-12228
VCID-pjwr-x9hp-g7dk Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an "invalid/corrupted" MIME body, which triggers a crash when the recipient listens to voicemail. CVE-2007-4521
VCID-q3py-mykt-4kax Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution. CVE-2025-49832
VCID-tmja-qaa1-8kex Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution. CVE-2025-57767
VCID-ttmk-fs9h-hufh An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop). CVE-2018-7287
VCID-tw8d-u845-r3dq Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. CVE-2022-24754
VCID-wbrs-de57-1bd9 Multiple buffer overflows in Asterisk might allow remote attackers to cause a Denial of Service condition. CVE-2014-2289
VCID-xcpx-unz5-gqbp Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length. CVE-2018-19278
VCID-xr4a-tmxe-8fcd Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-26712
VCID-yyjj-7dwq-nueq A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist. CVE-2018-7285
VCID-zv1p-p8tb-dqhm Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. CVE-2021-31878

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:07:04.617090+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:48:21.102716+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:21:48.603658+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:37.836545+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:02.657078+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:00.836378+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:39.955175+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:18.205850+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:55.029185+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:51.599409+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:33.097374+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:23.595150+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:51.533990+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:03.479008+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:21:27.132547+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:20.320289+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:39.437681+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:59.753072+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:37.332798+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:14.893298+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:46.430156+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:48.857004+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:43.356818+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:42.973080+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.557589+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.422210+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.106438+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.956305+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.886655+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.762447+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.640187+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.608608+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.578660+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.336912+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.088473+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:27:16.993884+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:17.896485+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:23.241946+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:00.245491+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:09.935917+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:11.186205+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:48.577370+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:47.962489+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:15.247858+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:11.776257+00:00 Debian Importer Fixing VCID-zv1p-p8tb-dqhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:05.398083+00:00 Debian Importer Fixing VCID-1t3u-22gq-qucr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:50.377096+00:00 Debian Importer Fixing VCID-agez-w3xn-63bt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:33.088173+00:00 Debian Importer Fixing VCID-yyjj-7dwq-nueq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:47.723475+00:00 Debian Importer Fixing VCID-wbrs-de57-1bd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:42.680894+00:00 Debian Importer Fixing VCID-2xc3-aqh8-cubn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:27.597928+00:00 Debian Importer Fixing VCID-81tr-5yzn-m7ap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:36.383286+00:00 Debian Importer Fixing VCID-4658-u85z-zqhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:56.226656+00:00 Debian Importer Fixing VCID-ttmk-fs9h-hufh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:51.025373+00:00 Debian Importer Fixing VCID-tmja-qaa1-8kex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:46.223188+00:00 Debian Importer Fixing VCID-xr4a-tmxe-8fcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:19.936877+00:00 Debian Importer Fixing VCID-1bxe-fg62-qugd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:05.177712+00:00 Debian Importer Fixing VCID-an47-cxfn-77e8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:38.510387+00:00 Debian Importer Fixing VCID-tw8d-u845-r3dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:05.181786+00:00 Debian Importer Fixing VCID-xcpx-unz5-gqbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:42.529500+00:00 Debian Importer Fixing VCID-a4na-u27r-sfc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:39.713066+00:00 Debian Importer Fixing VCID-q3py-mykt-4kax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:15.145010+00:00 Debian Importer Fixing VCID-mmng-tcuj-wkhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:51.046676+00:00 Debian Importer Fixing VCID-ge7t-fqyp-vyhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:49.036052+00:00 Debian Importer Fixing VCID-pjwr-x9hp-g7dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:38.420918+00:00 Debian Importer Fixing VCID-3r26-8d9e-aqdm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:32.552834+00:00 Debian Importer Fixing VCID-jez3-sw2r-r3d6 https://security-tracker.debian.org/tracker/data/json 38.1.0