Search for packages
purl | pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze12 |
Next non-vulnerable version | 1:22.5.1~dfsg+~cs6.15.60671435-1 |
Latest non-vulnerable version | 1:22.5.1~dfsg+~cs6.15.60671435-1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1ex7-49kd-fygc
Aliases: CVE-2018-7284 |
security update |
Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-1nxf-rat9-gkdf
Aliases: CVE-2013-7100 |
buffer overflow |
Affected by 92 other vulnerabilities. Affected by 84 other vulnerabilities. |
VCID-2fvx-kdpt-2ue7
Aliases: CVE-2020-35652 |
An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or when a SIP 181 response is received that contains a tel-uri in the Diversion header. |
Affected by 9 other vulnerabilities. |
VCID-2n1g-4wwt-gfej
Aliases: CVE-2017-16671 |
Affected by 51 other vulnerabilities. |
|
VCID-2sfc-kdm8-w3h2
Aliases: CVE-2011-2666 |
Affected by 92 other vulnerabilities. |
|
VCID-2ydq-8usj-73ag
Aliases: CVE-2023-49786 |
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6. |
Affected by 7 other vulnerabilities. |
VCID-3eee-zdak-guaw
Aliases: CVE-2016-2316 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. |
VCID-3ez1-5y2v-gqfg
Aliases: CVE-2012-5976 |
Affected by 92 other vulnerabilities. |
|
VCID-44xc-ex1j-73da
Aliases: CVE-2023-37457 |
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa. |
Affected by 7 other vulnerabilities. |
VCID-483t-t1pj-tfc6
Aliases: CVE-2022-42706 |
An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. |
Affected by 9 other vulnerabilities. |
VCID-4b2x-qkf9-ebbv
Aliases: CVE-2021-32686 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1. |
Affected by 9 other vulnerabilities. |
VCID-4eum-zhmd-kke8
Aliases: CVE-2014-4047 |
Affected by 84 other vulnerabilities. |
|
VCID-4kvs-gnjv-1ud9
Aliases: CVE-2022-26498 |
An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2. |
Affected by 9 other vulnerabilities. |
VCID-4rc8-g9hk-mbe4
Aliases: CVE-2022-23537 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1). |
Affected by 9 other vulnerabilities. |
VCID-4u58-7w4k-33gf
Aliases: CVE-2013-2264 |
Affected by 92 other vulnerabilities. |
|
VCID-5cm9-psxz-sqa2
Aliases: CVE-2013-2686 |
Affected by 92 other vulnerabilities. |
|
VCID-5p64-sz1a-qugh
Aliases: CVE-2022-24792 |
PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first. |
Affected by 9 other vulnerabilities. |
VCID-62ba-n9sh-cfc9
Aliases: CVE-2023-38703 |
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch. |
Affected by 7 other vulnerabilities. |
VCID-6qqh-zkxv-euet
Aliases: CVE-2011-1174 |
Affected by 92 other vulnerabilities. |
|
VCID-6qzn-rzxp-4ydd
Aliases: CVE-2014-2286 |
Affected by 84 other vulnerabilities. |
|
VCID-6smm-fs61-ykex
Aliases: CVE-2021-43845 |
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size. |
Affected by 9 other vulnerabilities. |
VCID-6zun-7rq8-hkfh
Aliases: CVE-2012-4737 |
Affected by 92 other vulnerabilities. |
|
VCID-79n7-nh9b-33gc
Aliases: CVE-2021-43303 |
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied |
Affected by 9 other vulnerabilities. |
VCID-7dwg-zmnz-wycv
Aliases: CVE-2023-49294 |
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue. |
Affected by 7 other vulnerabilities. |
VCID-7umf-wkmj-ebg2
Aliases: CVE-2014-4046 |
Affected by 84 other vulnerabilities. |
|
VCID-7vhp-xm5y-uugu
Aliases: CVE-2012-5977 |
Affected by 92 other vulnerabilities. |
|
VCID-81uv-14bd-nygs
Aliases: CVE-2015-3008 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. |
VCID-8hbq-9mdc-uqa8
Aliases: CVE-2011-4598 |
Affected by 92 other vulnerabilities. |
|
VCID-9mk4-bawk-xkhg
Aliases: CVE-2018-17281 |
security update |
Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-9nq8-wcz4-yqd1
Aliases: CVE-2012-2186 |
Affected by 92 other vulnerabilities. |
|
VCID-aadz-dq2p-1bbm
Aliases: CVE-2022-24764 |
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-aq7g-ut2j-v3gw
Aliases: CVE-2019-18610 |
An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands. |
Affected by 9 other vulnerabilities. |
VCID-aqsw-2ae2-9ybj
Aliases: CVE-2019-12827 |
Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message. |
Affected by 9 other vulnerabilities. |
VCID-ax5d-4x6m-cuf4
Aliases: CVE-2025-47779 |
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-az3a-8gfw-jugd
Aliases: CVE-2022-21723 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-b3n8-u3xd-uqdu
Aliases: CVE-2022-23547 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch. |
Affected by 9 other vulnerabilities. |
VCID-b6zx-xed5-qbgq
Aliases: CVE-2014-2287 |
Affected by 84 other vulnerabilities. |
|
VCID-bd3d-h2re-w3h1
Aliases: CVE-2019-18790 |
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. |
Affected by 9 other vulnerabilities. |
VCID-cq1n-wwv5-qkcx
Aliases: CVE-2023-27585 |
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead. |
Affected by 9 other vulnerabilities. |
VCID-ctq5-7j7y-gqh3
Aliases: CVE-2022-26499 |
An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2. |
Affected by 9 other vulnerabilities. |
VCID-cy88-c7sv-byfg
Aliases: CVE-2016-7550 |
asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote). |
Affected by 66 other vulnerabilities. |
VCID-d76h-v3yp-jydf
Aliases: CVE-2024-42491 |
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-dbsm-9e6m-ubhb
Aliases: CVE-2021-43302 |
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters. |
Affected by 9 other vulnerabilities. |
VCID-dftu-cfg3-ducw
Aliases: CVE-2021-37706 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-e6he-9p7z-bbft
Aliases: CVE-2021-46837 |
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation. |
Affected by 9 other vulnerabilities. |
VCID-edsv-fhyr-kqcp
Aliases: CVE-2014-6610 |
Affected by 84 other vulnerabilities. |
|
VCID-eesz-6ucg-1fd9
Aliases: CVE-2019-7251 |
An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation. |
Affected by 51 other vulnerabilities. |
VCID-ep2g-t1j9-f7ba
Aliases: CVE-2014-8414 |
Affected by 66 other vulnerabilities. |
|
VCID-eran-kpag-kqeh
Aliases: CVE-2021-43299 |
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. |
Affected by 9 other vulnerabilities. |
VCID-et4a-nh54-dubf
Aliases: CVE-2018-12227 |
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints. |
Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-eus2-xch4-ryb8
Aliases: CVE-2022-24793 |
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead. |
Affected by 9 other vulnerabilities. |
VCID-ez16-5s1z-j7d8
Aliases: CVE-2012-1183 |
Affected by 92 other vulnerabilities. |
|
VCID-f8c6-z25e-b7gp
Aliases: CVE-2022-39244 |
PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue. |
Affected by 9 other vulnerabilities. |
VCID-fb17-wsfb-rbg3
Aliases: CVE-2018-7286 |
security update |
Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-fgcb-pkf8-43em
Aliases: CVE-2020-28242 |
An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur. |
Affected by 9 other vulnerabilities. |
VCID-gsy6-55mb-4yee
Aliases: CVE-2012-0885 |
Affected by 92 other vulnerabilities. |
|
VCID-hbsh-xkdm-due3
Aliases: CVE-2017-17850 |
Affected by 51 other vulnerabilities. |
|
VCID-hm9e-snjg-83bn
Aliases: CVE-2014-8415 |
Affected by 66 other vulnerabilities. |
|
VCID-hnpz-pg77-u7cx
Aliases: CVE-2017-7617 |
Affected by 66 other vulnerabilities. |
|
VCID-j2fn-agvf-3qf1
Aliases: CVE-2022-21722 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-jkm5-e1df-b3ga
Aliases: CVE-2011-1175 |
Affected by 92 other vulnerabilities. |
|
VCID-jpw7-7mwp-8khd
Aliases: CVE-2022-26651 |
An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14. |
Affected by 9 other vulnerabilities. |
VCID-k9ws-qhhf-fkef
Aliases: CVE-2021-43300 |
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. |
Affected by 9 other vulnerabilities. |
VCID-kkpn-1vz3-x3c2
Aliases: CVE-2012-3812 |
Affected by 92 other vulnerabilities. |
|
VCID-kqz1-cqzk-skh1
Aliases: CVE-2016-2232 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. |
VCID-ksnr-v863-xuf1
Aliases: CVE-2011-3389 |
Affected by 66 other vulnerabilities. |
|
VCID-kwuv-q8nt-byfv
Aliases: CVE-2012-2414 |
Affected by 92 other vulnerabilities. |
|
VCID-kyrk-e2dj-67fr
Aliases: CVE-2019-15297 |
res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference. |
Affected by 9 other vulnerabilities. |
VCID-kz2s-pk66-27aj
Aliases: CVE-2017-14099 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-kz5z-4a27-zfe3
Aliases: CVE-2020-28327 |
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. |
Affected by 9 other vulnerabilities. |
VCID-kznp-qws7-p7er
Aliases: CVE-2011-2529 |
Affected by 92 other vulnerabilities. |
|
VCID-m5ue-4jkn-hqc6
Aliases: CVE-2012-1184 |
Affected by 92 other vulnerabilities. |
|
VCID-m9u8-9jz8-5fda
Aliases: CVE-2019-18976 |
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940. |
Affected by 51 other vulnerabilities. |
VCID-mbkv-ygup-9bdt
Aliases: CVE-2012-2947 |
Affected by 92 other vulnerabilities. |
|
VCID-mcy1-7jby-bbcr
Aliases: CVE-2022-24786 |
PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-mjsv-8bcv-c7fq
Aliases: CVE-2017-14603 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-mw3k-epge-vfc1
Aliases: CVE-2014-8418 |
Affected by 66 other vulnerabilities. |
|
VCID-mx1n-yc4a-a7h2
Aliases: CVE-2024-42365 |
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-nhxz-b5a2-ffgu
Aliases: CVE-2011-1507 |
Affected by 92 other vulnerabilities. |
|
VCID-nmdu-bxy3-qubt
Aliases: CVE-2017-16672 |
Affected by 51 other vulnerabilities. |
|
VCID-nzyb-tgbf-37ep
Aliases: CVE-2021-26717 |
An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash. |
Affected by 9 other vulnerabilities. |
VCID-pu2m-dvv5-9kag
Aliases: CVE-2017-17664 |
Affected by 51 other vulnerabilities. |
|
VCID-pu7p-7bnc-3ubx
Aliases: CVE-2021-26906 |
An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure. |
Affected by 9 other vulnerabilities. |
VCID-q19k-krgf-r7d5
Aliases: CVE-2012-2416 |
Affected by 92 other vulnerabilities. |
|
VCID-q8h1-4puu-8bgv
Aliases: CVE-2012-2415 |
Affected by 92 other vulnerabilities. |
|
VCID-q9b8-94n4-fyhk
Aliases: CVE-2017-9358 |
Affected by 66 other vulnerabilities. |
|
VCID-qat7-qg96-43gu
Aliases: CVE-2017-17090 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-qhsa-mzc9-2fc2
Aliases: CVE-2021-43804 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-r9fg-q9t2-x7hp
Aliases: CVE-2022-23608 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue. |
Affected by 9 other vulnerabilities. |
VCID-rck4-t1sz-hkf4
Aliases: CVE-2012-2948 |
Affected by 92 other vulnerabilities. |
|
VCID-re8z-88hr-d3e2
Aliases: CVE-2014-8413 |
Affected by 66 other vulnerabilities. |
|
VCID-rrvb-wb1m-7kck
Aliases: CVE-2011-1599 |
Affected by 92 other vulnerabilities. |
|
VCID-rvfq-jqny-gqfh
Aliases: CVE-2022-24763 |
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. |
Affected by 9 other vulnerabilities. |
VCID-s1rt-gnv6-tkdf
Aliases: CVE-2022-37325 |
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. |
Affected by 9 other vulnerabilities. |
VCID-s239-xz8v-jfdw
Aliases: CVE-2017-14098 |
Affected by 51 other vulnerabilities. |
|
VCID-s882-7wh7-tfh3
Aliases: CVE-2011-4063 |
Affected by 92 other vulnerabilities. |
|
VCID-sfm5-5rng-17g9
Aliases: CVE-2025-47780 |
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-t8q7-3fhv-zugn
Aliases: CVE-2021-43301 |
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. |
Affected by 9 other vulnerabilities. |
VCID-tbrm-tuz4-fqda
Aliases: CVE-2012-3863 |
Affected by 92 other vulnerabilities. |
|
VCID-tk43-15v4-dkbx
Aliases: CVE-2014-9374 |
Affected by 66 other vulnerabilities. |
|
VCID-uzdw-nned-vbhc
Aliases: CVE-2016-7551 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. |
VCID-vaag-3cq8-tfhj
Aliases: CVE-2014-8416 |
Affected by 66 other vulnerabilities. |
|
VCID-vcyt-d1z3-4qbf
Aliases: CVE-2011-2216 |
Affected by 92 other vulnerabilities. |
|
VCID-vep8-wx21-eufs
Aliases: CVE-2011-1147 |
Affected by 92 other vulnerabilities. |
|
VCID-vff8-n93t-bfdc
Aliases: CVE-2017-14100 |
security update |
Affected by 84 other vulnerabilities. Affected by 66 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-vq98-gkjp-vyd8
Aliases: CVE-2016-9938 |
Affected by 66 other vulnerabilities. |
|
VCID-vuu6-f73c-sbff
Aliases: CVE-2013-5641 |
several |
Affected by 92 other vulnerabilities. Affected by 84 other vulnerabilities. |
VCID-vy2p-vaj9-kbgn
Aliases: CVE-2022-31031 |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue. |
Affected by 9 other vulnerabilities. |
VCID-wn7c-f12t-7kc2
Aliases: CVE-2013-5642 |
several |
Affected by 92 other vulnerabilities. Affected by 84 other vulnerabilities. |
VCID-wwaj-453f-67ff
Aliases: CVE-2015-1558 |
Affected by 66 other vulnerabilities. |
|
VCID-wxjw-pb8c-vbcc
Aliases: CVE-2011-2665 |
Affected by 92 other vulnerabilities. |
|
VCID-wyw2-fjdp-j7eg
Aliases: CVE-2011-4597 |
Affected by 92 other vulnerabilities. |
|
VCID-x4p3-wad9-ykes
Aliases: CVE-2020-35776 |
A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses. |
Affected by 9 other vulnerabilities. |
VCID-x8x7-aa9q-d7fj
Aliases: CVE-2022-42705 |
A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. |
Affected by 9 other vulnerabilities. |
VCID-xvx1-vbbr-pbca
Aliases: CVE-2019-13161 |
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration). |
Affected by 9 other vulnerabilities. |
VCID-xxe3-nq4c-bkec
Aliases: CVE-2022-39269 |
PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability. |
Affected by 9 other vulnerabilities. |
VCID-yc5f-mge7-b7ea
Aliases: CVE-2024-53566 |
An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ytp9-t8w8-pkga
Aliases: CVE-2011-2536 |
Affected by 92 other vulnerabilities. |
|
VCID-yw9g-x7m2-m3av
Aliases: CVE-2014-8412 |
Affected by 66 other vulnerabilities. |
|
VCID-z93k-9vnr-qkdk
Aliases: CVE-2011-2535 |
Affected by 92 other vulnerabilities. |
|
VCID-zcgy-1q35-3qay
Aliases: CVE-2014-8417 |
Affected by 66 other vulnerabilities. |
|
VCID-zqwm-s52p-sqfd
Aliases: CVE-2021-32558 |
An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur. |
Affected by 9 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-chsk-7yb4-g7hs |
CVE-2011-0495
|
|
VCID-dcye-pxn1-ebg7 | asterisk allows calls on prohibited networks |
CVE-2009-3723
|
VCID-f9sw-1ups-fydu |
CVE-2010-0685
|
|
VCID-hsm9-agf4-nfd9 |
CVE-2009-4055
|
|
VCID-hzuu-enva-wbhj | asterisk: Replies to failed login attempts differently based on whether the user account exists (information disclosure) |
CVE-2009-0041
|
VCID-mqw1-45ev-47hm | Asterisk: Remote DoS via specially-crafted FaxMaxDatagram SDP packets (AST-2010-001) |
CVE-2010-0441
|
VCID-rsgs-7ta5-m7dn | FrameWork: XSS Ajax requests (AST-2009-009) |
CVE-2008-7220
|
VCID-s1a6-dgha-muf1 | asterisk: IAX2 DoS vulnerability (AST-2009-006) |
CVE-2009-2346
|
VCID-sxh7-sk5y-vqde | embedded prototype.js JavaScript hijacking |
CVE-2007-2383
|
VCID-ty7x-r862-j3by | asterisk: SIP valid account enumeration flaw |
CVE-2008-3903
|
VCID-vv7k-wqbq-zyap | asterisk: remote DoS on receipt of malformed RTP text frames |
CVE-2009-2651
|
VCID-xfwz-3vkw-uqfu | Asterisk: SIP responses expose valid usernames (AST-2009-008) |
CVE-2009-3727
|
VCID-yehk-sa2p-fqe9 |
CVE-2010-1224
|
|
VCID-zt9g-ykpy-33fz | asterisk: Remote Crash Vulnerability in SIP channel driver (AST-2009-005) |
CVE-2009-2726
|