Digium

Certified Asterisk

51 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 15.04.2022 05:15:06
  • Zuletzt bearbeitet 21.11.2024 06:54:15

An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a ...

Exploit
  • EPSS 2.48%
  • Veröffentlicht 30.07.2021 14:15:16
  • Zuletzt bearbeitet 21.11.2024 06:07:16

An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported med...

  • EPSS 0.16%
  • Veröffentlicht 19.02.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:56:43

A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending mu...

  • EPSS 1.65%
  • Veröffentlicht 18.02.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:56:43

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.

  • EPSS 0.51%
  • Veröffentlicht 18.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:57:00

An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSI...

  • EPSS 0.44%
  • Veröffentlicht 18.02.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:44

An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would...

Exploit
  • EPSS 2.76%
  • Veröffentlicht 06.11.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:22:33

A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return ...

  • EPSS 43.01%
  • Veröffentlicht 22.11.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:21

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafte...

  • EPSS 0.17%
  • Veröffentlicht 22.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:55

An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash w...

  • EPSS 7.42%
  • Veröffentlicht 22.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:34

An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP addre...