Digium

Asterisk

114 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 14.12.2023 20:15:52
  • Last modified 21.11.2024 08:11:44

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialpla...

  • EPSS 10.36%
  • Published 14.12.2023 20:15:52
  • Last modified 21.11.2024 08:33:12

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dang...

Exploit
  • EPSS 0.05%
  • Published 14.12.2023 20:15:52
  • Last modified 21.11.2024 08:33:50

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the he...

  • EPSS 0.05%
  • Published 30.08.2022 07:15:07
  • Last modified 21.11.2024 06:34:47

res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-inv...

  • EPSS 0.24%
  • Published 15.04.2022 05:15:06
  • Last modified 21.11.2024 06:54:03

An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fix...

  • EPSS 0.3%
  • Published 15.04.2022 05:15:06
  • Last modified 21.11.2024 06:54:03

An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2.

  • EPSS 0.18%
  • Published 15.04.2022 05:15:06
  • Last modified 21.11.2024 06:54:15

An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a ...

Exploit
  • EPSS 0.54%
  • Published 30.07.2021 14:15:16
  • Last modified 21.11.2024 06:06:24

An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.

Exploit
  • EPSS 2.48%
  • Published 30.07.2021 14:15:16
  • Last modified 21.11.2024 06:07:16

An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported med...

  • EPSS 0.16%
  • Published 19.02.2021 20:15:13
  • Last modified 21.11.2024 05:56:43

A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending mu...