6.5

CVE-2021-26713

A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DigiumAsterisk Version >= 16.0.0 < 16.16.1
DigiumAsterisk Version >= 17.0.0 < 17.9.2
DigiumAsterisk Version >= 18.0.0 < 18.2.1
DigiumCertified Asterisk Version16.8 Update-
DigiumCertified Asterisk Version16.8 Updatecert1-rc1
DigiumCertified Asterisk Version16.8 Updatecert1-rc2
DigiumCertified Asterisk Version16.8 Updatecert1-rc3
DigiumCertified Asterisk Version16.8 Updatecert1-rc4
DigiumCertified Asterisk Version16.8 Updatecert2
DigiumCertified Asterisk Version16.8 Updatecert3
DigiumCertified Asterisk Version16.8 Updatecert4
DigiumCertified Asterisk Version16.8 Updatecert4-rc1
DigiumCertified Asterisk Version16.8 Updatecert4-rc2
DigiumCertified Asterisk Version16.8 Updatecert4-rc3
DigiumCertified Asterisk Version16.8 Updatecert4-rc4
DigiumCertified Asterisk Version16.8 Updatecert5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.379
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:N/I:N/A:P
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.