Sangoma

Asterisk

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 05.12.2022 21:15:10
  • Zuletzt bearbeitet 24.04.2025 15:15:50

An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk c...

  • EPSS 0.73%
  • Veröffentlicht 05.12.2022 21:15:10
  • Zuletzt bearbeitet 24.04.2025 15:15:50

A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport ...

  • EPSS 1.2%
  • Veröffentlicht 22.02.2022 20:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:47

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario...

  • EPSS 0.72%
  • Veröffentlicht 27.01.2022 00:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:46

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a mal...

  • EPSS 0.51%
  • Veröffentlicht 22.12.2021 18:15:07
  • Zuletzt bearbeitet 04.11.2025 16:15:43

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribut...

Exploit
  • EPSS 2.76%
  • Veröffentlicht 06.11.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:22:33

A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return ...

  • EPSS 0.59%
  • Veröffentlicht 06.11.2020 06:15:11
  • Zuletzt bearbeitet 21.11.2024 05:22:30

An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in...

  • EPSS 0.65%
  • Veröffentlicht 29.10.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 01:08:03

asterisk allows calls on prohibited networks

Exploit
  • EPSS 0.42%
  • Veröffentlicht 12.06.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read t...

  • EPSS 1.72%
  • Veröffentlicht 02.06.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and...