Search for packages
Package details: pkg:deb/debian/asterisk@1:22.4.1~dfsg%2B~cs6.15.60671435-2
purl pkg:deb/debian/asterisk@1:22.4.1~dfsg%2B~cs6.15.60671435-2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-8uv1-cdwb-2uec Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47780
VCID-cj97-awga-gycz Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function CVE-2024-57520
VCID-cug9-jj63-ffc1 Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47779

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-21T14:23:04.576389+00:00 Debian Importer Fixing VCID-cug9-jj63-ffc1 https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T08:55:49.730788+00:00 Debian Importer Fixing VCID-cj97-awga-gycz https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T01:26:53.430563+00:00 Debian Importer Fixing VCID-8uv1-cdwb-2uec https://security-tracker.debian.org/tracker/data/json 36.1.3