Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@1:16.10.0~dfsg-1?distro=sid
purl pkg:deb/debian/asterisk@1:16.10.0~dfsg-1?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-32hs-eqw2-1kf2 An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. CVE-2019-18790
VCID-5yue-52xt-ryhw An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands. CVE-2019-18610
VCID-917e-7kp2-y3hw res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference. CVE-2019-15297

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:08:29.032743+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:21.326938+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:46.155382+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:41.176138+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.140936+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:41.073092+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:34.942487+00:00 Debian Importer Fixing VCID-917e-7kp2-y3hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:17.467184+00:00 Debian Importer Fixing VCID-5yue-52xt-ryhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:26.169406+00:00 Debian Importer Fixing VCID-32hs-eqw2-1kf2 https://security-tracker.debian.org/tracker/data/json 38.1.0