Digium

Certified Asterisk

51 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.64%
  • Published 09.11.2017 00:29:00
  • Last modified 20.04.2025 01:37:25

A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus,...

  • EPSS 0.75%
  • Published 10.10.2017 01:30:21
  • Last modified 20.04.2025 01:37:25

In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined w...

  • EPSS 34.96%
  • Published 02.09.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program c...

  • EPSS 0.37%
  • Published 02.09.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possi...

  • EPSS 3.66%
  • Published 02.06.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP...

  • EPSS 0.32%
  • Published 02.06.2017 05:29:00
  • Last modified 20.04.2025 01:37:25

The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (out-of-bounds read...

  • EPSS 6.63%
  • Published 17.04.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 before 11.6-cert15 and 13.8 before 13.8-cert3 allows remote attackers to cause a denial of service (port exhaustion).

  • EPSS 18.44%
  • Published 10.04.2017 14:59:00
  • Last modified 20.04.2025 01:37:25

Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan...

  • EPSS 1.92%
  • Published 12.12.2016 21:59:01
  • Last modified 12.04.2025 10:46:40

An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for white...

Exploit
  • EPSS 1.09%
  • Published 22.02.2016 15:59:02
  • Last modified 12.04.2025 10:46:40

chan_sip in Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245,...