Digium

Asterisk

114 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.65%
  • Veröffentlicht 18.02.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:56:43

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 18.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:28:03

A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.

  • EPSS 0.44%
  • Veröffentlicht 18.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:44

An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would...

  • EPSS 0.51%
  • Veröffentlicht 18.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:00

An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSI...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 29.01.2021 08:15:10
  • Zuletzt bearbeitet 21.11.2024 05:27:45

An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contai...

  • EPSS 43.01%
  • Veröffentlicht 22.11.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:21

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafte...

  • EPSS 7.42%
  • Veröffentlicht 22.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:34

An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP addre...

  • EPSS 0.17%
  • Veröffentlicht 22.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:55

An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash w...

  • EPSS 2.3%
  • Veröffentlicht 09.09.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:28:24

res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media o...

  • EPSS 8.8%
  • Veröffentlicht 09.09.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:10

main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.