Vulnerabilites related to sangoma - asterisk
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3632620E-8A6D-4D65-BED9-80C0E7CEA8DD", "versionEndExcluding": "16.29.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "667B21FC-79F4-47C6-A116-84D6A6CB34FA", "versionEndExcluding": "18.15.1", "versionStartIncluding": "18.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A26F9A47-00F4-4A96-B679-E8D68E842E32", "versionEndExcluding": "19.7.1", "versionStartIncluding": "19.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:20.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADB799D3-B6BE-468C-8D3E-B087ED287B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*", "matchCriteriaId": "892BAE5D-A64E-4FE0-9A99-8C07F342A042", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription." }, { "lang": "es", "value": "Un use after free en res_pjsip_pubsub.c en Sangoma Asterisk 16.28, 18.14, 19.6 y certificado/18.9-cert2 puede permitir que un atacante remoto autenticado bloquee Asterisk (denegaci\u00f3n de servicio) al realizar actividad en una suscripci\u00f3n a trav\u00e9s de un transporte confiable en al mismo tiempo que Asterisk tambi\u00e9n realiza actividad en esa suscripci\u00f3n." } ], "id": "CVE-2022-42705", "lastModified": "2024-11-21T07:25:11.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T21:15:10.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2023/dsa-5358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5358" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2018-007.html | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/104457 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-27807 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2018-007.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104457 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-27807 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FCCB6E3-0DD7-4B3B-9403-19CB827840FB", "versionEndExcluding": "15.4.1", "versionStartIncluding": "15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable." }, { "lang": "es", "value": "Se ha descubierto un problema en Asterisk Open Source en versiones 15.x anteriores a la 15.4.1. Cuando se conecta a Asterisk v\u00eda TCP/TLS, si el cliente se desconecta abruptamente o env\u00eda un mensaje especialmente dise\u00f1ado, entonces Asterisk queda atrapado en un bucle infinito mientras intenta leer el flujo de datos. Esto hace que el sistema se vuelva inutilizable." } ], "id": "CVE-2018-12228", "lastModified": "2024-11-21T03:44:49.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-12T04:29:00.330", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104457" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
teluu | pjsip | * | |
asterisk | certified_asterisk | * | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BB0273A-3235-4BC7-A1BE-7D35BABD8617", "versionEndIncluding": "2.11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "02200524-98C1-49E2-8DFE-7BE82E1181E2", "versionEndExcluding": "16.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "E64BCD44-2298-4710-9CC3-DF82E6A8DF94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "91CCAB0C-C0F8-4619-AAE1-F6F13FF31570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "F2B7CBB3-E037-416B-AD16-9A553D6A4775", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "DE7DDFE1-6A06-477A-AB45-D00053CFA7EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "A35C117A-6EFB-42EB-AD2A-EA7866606927", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "40003CBE-792F-4875-9E60-6F1CE0BBAA8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "46A7AA7B-13F2-496A-99ED-1CC13234E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "147663CB-B48D-4D89-96BF-F92FF96F347F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "27DBBC83-930A-4ECE-8C1E-47481D881B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "B987A13D-A363-4DCE-BBA1-E35E81ACBA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "01A5B7F9-FAD2-4C0C-937D-CF1086512130", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "F60B4271-F987-4932-86EE-45ED099661E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE99C3B4-20EC-4AC8-9A0A-C690E2DBED99", "versionEndExcluding": "16.24.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C109B569-DE0D-4AE4-A128-239077CCC05F", "versionEndExcluding": "18.10.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "44E4E3A7-8CB3-491C-98F6-F78345533E3B", "versionEndExcluding": "19.2.1", "versionStartIncluding": "19.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue." }, { "lang": "es", "value": "PJSIP es una biblioteca de comunicaci\u00f3n multimedia gratuita y de c\u00f3digo abierto escrita en lenguaje C que implementa protocolos basados en est\u00e1ndares como SIP, SDP, RTP, STUN, TURN e ICE. En las versiones hasta la versi\u00f3n 2.11.1 inclusive, cuando se encuentra en un escenario de conjunto de di\u00e1logos (o bifurcaci\u00f3n), una clave hash compartida por varios di\u00e1logos de UAC puede potencialmente liberarse prematuramente cuando se destruye uno de los di\u00e1logos. El problema puede hacer que un conjunto de di\u00e1logos se registre en la tabla hash varias veces (con diferentes claves hash), lo que lleva a un comportamiento indefinido, como la colisi\u00f3n de la lista de di\u00e1logos, lo que eventualmente conduce a un bucle sin fin. Hay un parche disponible en la confirmaci\u00f3n db3235953baa56d2fb0e276ca510fefca751643f que se incluir\u00e1 en la pr\u00f3xima versi\u00f3n. No hay soluciones alternativas conocidas para este problema" } ], "id": "CVE-2022-23608", "lastModified": "2024-11-21T06:48:55.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-22T20:15:07.693", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/1" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "4889B1B5-5160-476E-A1C0-BEAE63C85CEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "62867AEF-D685-4B1F-8AB9-D1CCAC559821", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "ACE48FBD-2560-4477-ABD2-C90729523BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "97F03C40-6B70-41D1-96CF-DD5F2924D0C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B8F0B6E3-37B8-4780-BB17-D471A7AB7E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "445941A9-EE2C-45C0-BCEB-9EC7F9F9439D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "7C60A84B-E0BC-491B-B6E6-76E658BB91EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "035B04BC-C132-4CF6-9FE4-561A4104F392", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E21DF0C9-16E4-44B0-8749-85F7F245A87A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AE6A2723-FAE7-4A87-A2A3-E94D9CC2DCB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "37612FE6-C8B7-4925-81F5-ADB82A8F101E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "92181940-ED5C-442C-82BA-4F0F233FB11B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "28EEF1DB-00C6-4DFC-BB48-C4A308F60DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "67CE3E94-341F-4D0C-937E-39B119925C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5C721635-2801-40E8-B5FE-734054D718D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "15ED9311-9E4E-4998-BD99-CDEB8E4F2C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "815F7045-FC6D-4D57-A7AE-F63B0FC67251", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "09918CFC-C6A0-45ED-91EA-A4D9295C6CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "A7D38CAA-BECD-4FD7-8E42-72CB2B1DC699", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F211C14-8E50-4FB7-82EA-FE6975290DE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0698EDFB-D156-4572-9008-0243FA6FD2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "16350161-9CF1-4AD3-954C-598D249CF962", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "24EB6F7B-AD3C-42A2-B811-3CF3EEDD8438", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7AC55C54-7AD7-49BE-A050-DC6878391208", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B208EBB-0387-4223-A196-CE142E6B908B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "095BF874-0E0B-4F8F-8A11-ED096DD3A824", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4067E71D-93A8-4B56-AE4A-FCB6E31577E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "779DEAC5-CBC7-4844-9A2E-97AEB49704EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "913D2C84-B987-4DEE-8F9E-0FDF14BECE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "63889FD0-714B-4E02-8F34-00E4857A544A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A15B538D-DC9D-46B4-A455-341E8A2831E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "8FE32479-5D98-443F-8FA9-F6281726BDF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "78841A3E-7D56-4737-9815-E1144FD0A44A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC295454-D897-425C-BFC8-91A72865A132", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3830A3E2-09A1-487E-8EFA-27F8B4C61CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CAC942FB-83A2-4698-B410-F4C6AED0849A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "86ED40AD-0A52-4B4C-B4CA-F8D1A4CAF866", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07FC62DE-74D3-42A9-94E8-6DCE62F3D2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "39E78E52-2AA4-42A5-9CE6-22DF2CF01704", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "3DF04D4C-DFED-4E71-BA0C-854823BB41CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "518A8882-B1A6-408E-9B39-F01034A50190", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "2EBBB850-2AE6-4EC1-993F-AD7AF2E80008", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1075D5D-5F81-4E26-90B0-60659B8D36B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6880B042-11B1-430F-90A1-70F93FC5BAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "0F074B06-6788-47AB-8C39-BA5E2E39ACC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "1ACB7C4A-7CF7-4D57-B65D-741AFA6393EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85522E25-E76C-4CCF-AB7C-A74E1703D919", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AC3BE912-0B42-416B-A0E2-B17FDF07BAAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "4FC9C2FB-A77B-4242-B4A1-92112E1C19B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D9B19-BD1E-4E1C-A1C3-6C64A6612233", "versionEndIncluding": "1.8.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "33DD2B8E-6AB1-45CD-85F5-E0F5234585BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "52BDDAC0-5CEE-4054-8930-EAF25FE528FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "1CEB28DD-EAEA-45AF-8D7B-09E93AFABA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "12BCF63F-DA77-48A1-861D-F6E710E3CA16", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD0D03FF-3FF6-40D0-A78E-CBDEA4FE4F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66666CD2-8921-4641-AD72-21F4386DC731", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C549DD5-68F9-44FC-92B9-09A0E6F87315", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51407A8B-AF19-43FA-8D57-A6A35D465D1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "911CCAF6-6E29-43B6-AF76-909016CD46ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B46E218-9EFA-4224-BC5D-1A2F38559E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6F1F43E8-6159-46FA-8BF5-360EA9D466BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F75E0A69-9251-4CE1-9E83-188F0D35DEFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "17E6BD3C-B88D-4C80-B77F-2A95767B9A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AC1C9EC-A84F-401B-BF59-F4938B6A2F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCB76519-FD6D-4D74-8DF7-719822588C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6AB0DE5-0843-4A7A-A1C9-2FD7924FBEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "335F9C06-5E40-4E14-B018-15151E14414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9E8F15FB-C6B5-4A4F-A7AD-E2BF0162D1DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DEA8945-9ACD-4CE7-A5E6-5207E16C663E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B2A7FC21-74FF-48BF-9BA8-A143FCB2BF3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "C4FCD6B4-ED33-424F-AD30-64227894B0B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7D4883-79E3-4DD1-A555-136A0664E94E", "versionEndIncluding": "10.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode." }, { "lang": "es", "value": "chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Certified Asterisk 1.8.11-cert antes de v1.8.11-cert2 y Asterisk Open Source v1.8.x antes de v1.8.12.1 y v10.x antes de v10.4.1, permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (eliminar la referencia del puntero NULL y ca\u00edda demonio) por el cierre de una conexi\u00f3n en el modo de descuelgue." } ], "id": "CVE-2012-2948", "lastModified": "2024-11-21T01:40:00.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-02T15:55:01.027", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" }, { "source": "cve@mitre.org", "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/49303" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2493" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53723" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027103" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3632620E-8A6D-4D65-BED9-80C0E7CEA8DD", "versionEndExcluding": "16.29.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF6570E5-A413-42C2-87E2-873F65BE20D5", "versionEndExcluding": "18.15.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1A640E6-6378-4FA4-98B5-C32B5A937F7B", "versionEndExcluding": "19.7.1", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:20.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADB799D3-B6BE-468C-8D3E-B087ED287B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "B71A493F-F47B-4F19-AD21-3800DE63DF5A", "versionEndExcluding": "18.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*", "matchCriteriaId": "79EEB5E5-B79E-454B-8DCD-3272BA337A9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Sangoma Asterisk hasta 16.28, 17 y 18 hasta 18.14, 19 hasta 19.6 y se certific\u00f3 hasta 18.9-cert1. GetConfig, a trav\u00e9s de la interfaz de Asterisk Manager, permite que una aplicaci\u00f3n conectada acceda a archivos fuera del directorio de configuraci\u00f3n de Asterisk, aka como Directory Traversal." } ], "id": "CVE-2022-42706", "lastModified": "2024-11-21T07:25:11.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T21:15:10.227", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2023/dsa-5358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5358" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "ACE48FBD-2560-4477-ABD2-C90729523BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "97F03C40-6B70-41D1-96CF-DD5F2924D0C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B8F0B6E3-37B8-4780-BB17-D471A7AB7E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "445941A9-EE2C-45C0-BCEB-9EC7F9F9439D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "7C60A84B-E0BC-491B-B6E6-76E658BB91EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "035B04BC-C132-4CF6-9FE4-561A4104F392", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E21DF0C9-16E4-44B0-8749-85F7F245A87A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AE6A2723-FAE7-4A87-A2A3-E94D9CC2DCB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "37612FE6-C8B7-4925-81F5-ADB82A8F101E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "92181940-ED5C-442C-82BA-4F0F233FB11B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "28EEF1DB-00C6-4DFC-BB48-C4A308F60DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "67CE3E94-341F-4D0C-937E-39B119925C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5C721635-2801-40E8-B5FE-734054D718D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "93F81ACF-615F-4EF5-BD73-74F4010B43D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D773468A-4C2D-4B88-BAB6-C2D892A304C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "15ED9311-9E4E-4998-BD99-CDEB8E4F2C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "815F7045-FC6D-4D57-A7AE-F63B0FC67251", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "56BAE9D7-7A67-40D0-B864-66E76EBA5A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B82FFB08-0FCD-4839-95F4-97C09EB7E921", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "10C54588-265A-4955-8C73-38ADB664EF0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C2D84681-F861-49BE-832F-20EBAD3B60C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2313F843-0F74-4FC9-92A2-1F721BB4C490", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "09918CFC-C6A0-45ED-91EA-A4D9295C6CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "23E24161-31DB-4739-B16D-B0BDF5151307", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "E28DAA35-FBC2-4C87-BC1F-396A0FE86C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F5E4B4F-49B7-41CB-803B-47A0081C3112", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "27D37142-F88C-42DE-A0FD-B17AB7981963", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F1A5BD7C-3491-456A-A333-481977280F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "F7AFBC1D-7357-4A20-BF9D-C5B58155DAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "C85B74B6-EA5C-43C1-98C4-B09C41D9D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "12711E11-F6CF-4A61-83FD-AD3748D7C47B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "86E83CDF-E3B5-48A8-B526-67A1618B97AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "B9C8B329-AC4C-46E5-BAC3-B2B72C16A453", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A81245B-0276-4D51-A3B4-9CC7233C9A44", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9DC30C27-32BD-42A9-814E-123BD18F416B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "676BA331-833E-4C8B-A523-2116752567B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "A7D38CAA-BECD-4FD7-8E42-72CB2B1DC699", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F211C14-8E50-4FB7-82EA-FE6975290DE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0698EDFB-D156-4572-9008-0243FA6FD2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "16350161-9CF1-4AD3-954C-598D249CF962", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "24EB6F7B-AD3C-42A2-B811-3CF3EEDD8438", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7AC55C54-7AD7-49BE-A050-DC6878391208", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "4AA9DBB3-1008-4CC8-B81B-991F286A6C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B208EBB-0387-4223-A196-CE142E6B908B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "095BF874-0E0B-4F8F-8A11-ED096DD3A824", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4067E71D-93A8-4B56-AE4A-FCB6E31577E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D301553-EF77-4494-A893-FDC12E6A8C16", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "35362678-3960-40E0-BB94-4642F09DDB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "779DEAC5-CBC7-4844-9A2E-97AEB49704EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "913D2C84-B987-4DEE-8F9E-0FDF14BECE2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "63889FD0-714B-4E02-8F34-00E4857A544A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A15B538D-DC9D-46B4-A455-341E8A2831E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "8FE32479-5D98-443F-8FA9-F6281726BDF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "78841A3E-7D56-4737-9815-E1144FD0A44A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE8D88-E407-4E9F-8418-E95C16A55358", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3BDEDE38-79FE-4B21-BE42-E8AA14475AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC295454-D897-425C-BFC8-91A72865A132", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3830A3E2-09A1-487E-8EFA-27F8B4C61CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CAC942FB-83A2-4698-B410-F4C6AED0849A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "86ED40AD-0A52-4B4C-B4CA-F8D1A4CAF866", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7128AC5-5DD7-4BD3-B14C-4ADA155DD5E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA2C32DA-44CE-4407-84B2-02B0D0474000", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2B032B5-06AB-4ABE-B51E-DE5C13458C03", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07FC62DE-74D3-42A9-94E8-6DCE62F3D2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "39E78E52-2AA4-42A5-9CE6-22DF2CF01704", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "3DF04D4C-DFED-4E71-BA0C-854823BB41CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "518A8882-B1A6-408E-9B39-F01034A50190", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "2EBBB850-2AE6-4EC1-993F-AD7AF2E80008", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "F33168AF-A3FB-4694-9DC8-CC28A7C3B3E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1075D5D-5F81-4E26-90B0-60659B8D36B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6880B042-11B1-430F-90A1-70F93FC5BAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "0F074B06-6788-47AB-8C39-BA5E2E39ACC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "47805A52-856B-4C30-A04F-0B683FDBE075", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "1ACB7C4A-7CF7-4D57-B65D-741AFA6393EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "48300C6F-FAF2-4F0A-959F-4B1801AE7D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85522E25-E76C-4CCF-AB7C-A74E1703D919", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AC3BE912-0B42-416B-A0E2-B17FDF07BAAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "4FC9C2FB-A77B-4242-B4A1-92112E1C19B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DA237F1-0378-4B8C-9981-B3B47BCB3C50", "versionEndIncluding": "1.8.15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "33DD2B8E-6AB1-45CD-85F5-E0F5234585BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "52BDDAC0-5CEE-4054-8930-EAF25FE528FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "1CEB28DD-EAEA-45AF-8D7B-09E93AFABA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "12BCF63F-DA77-48A1-861D-F6E710E3CA16", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD0D03FF-3FF6-40D0-A78E-CBDEA4FE4F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "66666CD2-8921-4641-AD72-21F4386DC731", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E55A7B81-4661-4E77-94FE-DA8D6261DC74", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C549DD5-68F9-44FC-92B9-09A0E6F87315", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51407A8B-AF19-43FA-8D57-A6A35D465D1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "911CCAF6-6E29-43B6-AF76-909016CD46ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "964672AE-C840-465E-BE8A-8E19D9C060AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "48827211-8F2F-4801-A5CD-77B07D1DD320", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2463AD2-B341-494C-87AF-73B69B75D162", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B46E218-9EFA-4224-BC5D-1A2F38559E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6F1F43E8-6159-46FA-8BF5-360EA9D466BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F75E0A69-9251-4CE1-9E83-188F0D35DEFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "17E6BD3C-B88D-4C80-B77F-2A95767B9A71", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AC1C9EC-A84F-401B-BF59-F4938B6A2F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E5DACA8-EBD6-4854-A32E-EDBD8C28B3D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCB76519-FD6D-4D74-8DF7-719822588C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6AB0DE5-0843-4A7A-A1C9-2FD7924FBEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "335F9C06-5E40-4E14-B018-15151E14414D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9E8F15FB-C6B5-4A4F-A7AD-E2BF0162D1DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC77FCCF-EE5C-4121-A0AF-B9DC71E72C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C33423-6093-4DC9-BCFF-77003776373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DEA8945-9ACD-4CE7-A5E6-5207E16C663E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B2A7FC21-74FF-48BF-9BA8-A143FCB2BF3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "C4FCD6B4-ED33-424F-AD30-64227894B0B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6558058-33DA-43F1-9690-5DA11D5CC713", "versionEndIncluding": "10.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:*:cert5:*:*:*:*:*:*", "matchCriteriaId": "345918B8-ABB8-4E60-A3AD-C006AD24FEC4", "versionEndIncluding": "1.8.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "4889B1B5-5160-476E-A1C0-BEAE63C85CEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "62867AEF-D685-4B1F-8AB9-D1CCAC559821", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7C792E2-FBBA-4F1D-8842-5E47B4365FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "B14F1E15-52B4-4947-83EA-85D535FFB55E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "02461B94-32BA-487E-9E9E-D9B5AAAFF602", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:digiumphones:*:*:*:*:*:*:*:*", "matchCriteriaId": "7438E927-F320-4E40-AE4E-F571483A5D2F", "versionEndIncluding": "10.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:business_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "94539528-4DD3-4BB6-BFFE-920A3937A665", "versionEndIncluding": "c.3.7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "17D78AA8-AF67-4343-A9B0-EFC63D8CC4BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action." }, { "lang": "es", "value": "Vulnerabilidad de lista negra incompleta en main/manager.c en Asterisk Open Source v1.8.x antes de v1.8.15.1 y v10.x antes de v10.7.1, Certified Asterisk v1.8.11-8.1.11 antes de cert6, Digiumphones Asterisk v10.xx-digiumphones antes de v10.7.1-digiumphones y Asterisk Business Edition C.3.x antes de C.3.7.6 permite a usuarios remotos autenticados ejecutar comandos de su elecci\u00f3n aprovech\u00e1ndose de los privilegios de origen y proporcionando un valor ExternalIVR en una acci\u00f3n IAM Originate.\r\n" } ], "id": "CVE-2012-2186", "lastModified": "2024-11-21T01:38:40.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-31T14:55:00.950", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "source": "psirt@us.ibm.com", "url": "http://secunia.com/advisories/50687" }, { "source": "psirt@us.ibm.com", "url": "http://secunia.com/advisories/50756" }, { "source": "psirt@us.ibm.com", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "psirt@us.ibm.com", "url": "http://www.securitytracker.com/id?1027460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027460" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
teluu | pjsip | * | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BB0273A-3235-4BC7-A1BE-7D35BABD8617", "versionEndIncluding": "2.11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC49FD2F-9A64-4F92-9B73-50E37BEB207E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "E64BCD44-2298-4710-9CC3-DF82E6A8DF94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "91CCAB0C-C0F8-4619-AAE1-F6F13FF31570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "F2B7CBB3-E037-416B-AD16-9A553D6A4775", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "DE7DDFE1-6A06-477A-AB45-D00053CFA7EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "A35C117A-6EFB-42EB-AD2A-EA7866606927", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "40003CBE-792F-4875-9E60-6F1CE0BBAA8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "46A7AA7B-13F2-496A-99ED-1CC13234E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "147663CB-B48D-4D89-96BF-F92FF96F347F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "27DBBC83-930A-4ECE-8C1E-47481D881B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "B987A13D-A363-4DCE-BBA1-E35E81ACBA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "01A5B7F9-FAD2-4C0C-937D-CF1086512130", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "F60B4271-F987-4932-86EE-45ED099661E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE99C3B4-20EC-4AC8-9A0A-C690E2DBED99", "versionEndExcluding": "16.24.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C109B569-DE0D-4AE4-A128-239077CCC05F", "versionEndExcluding": "18.10.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "44E4E3A7-8CB3-491C-98F6-F78345533E3B", "versionEndExcluding": "19.2.1", "versionStartIncluding": "19.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds." }, { "lang": "es", "value": "PJSIP es una biblioteca de comunicaci\u00f3n multimedia gratuita y de c\u00f3digo abierto escrita en lenguaje C que implementa protocolos basados en est\u00e1ndares como SIP, SDP, RTP, STUN, TURN e ICE. En las versiones 2.11.1 y anteriores, el an\u00e1lisis de un mensaje SIP entrante que contiene una multiparte malformada puede causar potencialmente un acceso de lectura fuera de l\u00edmites. Este problema afecta a todos los usuarios de PJSIP que aceptan multipartes SIP. El parche est\u00e1 disponible como commit en la rama \"master\". No se presentan medidas de mitigaci\u00f3n conocidas" } ], "id": "CVE-2022-21723", "lastModified": "2024-11-21T06:45:18.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-27T00:15:07.737", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/2" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
asterisk | certified_asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
fedoraproject | fedora | 33 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FD83903-7BCB-4980-AB42-957867077070", "versionEndIncluding": "16.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "55E64E8D-DE76-4047-813E-0325E49D7BFB", "versionEndExcluding": "13.37.1", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F2DA86C-6FB5-4ACC-83BF-812BECD26441", "versionEndExcluding": "16.14.1", "versionStartIncluding": "16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB33E582-97C0-428E-A696-BF84F9E2E5D5", "versionEndExcluding": "17.8.1", "versionStartIncluding": "17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "716CD81A-8970-42B6-92CB-42D9C9C36B5C", "versionEndExcluding": "18.0.1", "versionStartIncluding": "18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Asterisk Open Source versiones 13.x anteriores a 13.37.1, versiones 16.x anteriores a 16.14.1, versiones 17.x anteriores a 17.8.1 y versiones 18.x anteriores a 18.0.1 y Certified Asterisk versiones anteriores a 16.8-cert5.\u0026#xa0;Si Asterisk es desafiado en un INVITE saliente y el nonce es cambiado en cada respuesta, Asterisk enviar\u00e1 los INVITE continuamente en un bucle.\u0026#xa0;Esto causa que Asterisk consuma m\u00e1s y m\u00e1s memoria ya que la transacci\u00f3n nunca terminar\u00e1 (incluso si la llamada se cuelga), lo que a la larga conllevar\u00e1 a un reinicio o cierre de Asterisk. Para que esto ocurra, la autenticaci\u00f3n saliente debe ser configurada en el endpoint" } ], "id": "CVE-2020-28242", "lastModified": "2024-11-21T05:22:30.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-06T06:15:11.930", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "524CF00B-1B36-4C1F-80B4-28349891669B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "2942FA48-42CE-4E67-A5BF-7852652EDE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*", "matchCriteriaId": "4160A834-9194-474C-819B-60627E470D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*", "matchCriteriaId": "D81F6E55-80F1-4770-9FF0-305EEEF3C4E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*", "matchCriteriaId": "087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*", "matchCriteriaId": "471032A5-5EB6-44D1-91C8-BEA42C1E205A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "6FEB3FCA-065E-4C32-A4C7-F2C79F214F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*", "matchCriteriaId": "636D765F-C47B-4762-9419-D7B51FA38AEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*", "matchCriteriaId": "36F29EE8-E05F-4F0A-B0FA-66C551856C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*", "matchCriteriaId": "CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.1:*:business:*:*:*:*:*", "matchCriteriaId": "3BAD5B3E-80FC-4B23-BD51-41D17BFA9C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.3:*:business:*:*:*:*:*", "matchCriteriaId": "0B09EFBF-B8AD-455F-8F47-7C8F52371214", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.4:*:business:*:*:*:*:*", "matchCriteriaId": "4CF18A17-E16D-4529-9705-6E2333C89CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.5:*:business:*:*:*:*:*", "matchCriteriaId": "1ED6AC46-E485-4D0A-BFC1-3DEED113B9B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.6:*:business:*:*:*:*:*", "matchCriteriaId": "25A4B8D6-373F-442B-978A-61E53EEA9870", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.8:*:business:*:*:*:*:*", "matchCriteriaId": "30D7485F-109D-46B9-8E6E-52E963080BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:b.2.5.9:*:business:*:*:*:*:*", "matchCriteriaId": "D5C22240-282C-4B10-8CAE-CC07E5784C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*", "matchCriteriaId": "D0A87D63-35F5-47D7-893B-E8B179B16C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*", "matchCriteriaId": "95C1809E-9031-483F-B873-160284FA71D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*", "matchCriteriaId": "E35C336A-A786-476B-8B9F-E682D999B6AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*", "matchCriteriaId": "8121721B-EBC6-44EA-86D6-7B0FF1C8FF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.6.2:*:business:*:*:*:*:*", "matchCriteriaId": "1E76B3DD-5C38-4323-9F24-9327CC4E6FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.8.1:*:business:*:*:*:*:*", "matchCriteriaId": "EB75A0FE-9D22-4DDB-909C-C87036328499", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.3:*:business:*:*:*:*:*", "matchCriteriaId": "75003D80-231D-4AC4-8346-4D4E4C8643E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.4:*:business:*:*:*:*:*", "matchCriteriaId": "A04E037D-7F3F-4387-818D-1D618885AAF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.1.10.5:*:business:*:*:*:*:*", "matchCriteriaId": "2CACA83A-4D1E-458D-BA30-3C138FB848E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.1.2.1:*:business:*:*:*:*:*", "matchCriteriaId": "32D447AB-DAF1-4F70-8686-156C0ACDAE4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.3:*:business:*:*:*:*:*", "matchCriteriaId": "6A958EDA-6FB8-447B-B190-8802C9DC9D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.3.3:*:business:*:*:*:*:*", "matchCriteriaId": "30FDE355-2209-46D4-A4E9-4DF7B128014F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.2.4.2:*:business:*:*:*:*:*", "matchCriteriaId": "9CCDC56D-22F0-4617-A2FE-A23889F9C9AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:asterisk:c.3.1.0:*:business:*:*:*:*:*", "matchCriteriaId": "E6B4EC4D-957C-4A93-B65C-10114845A226", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*", "matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*", "matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*", "matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*", "matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*", "matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4C510A9A-C3E2-4AF8-9919-1A22E918CDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "A4EBFB79-C269-4132-BFAB-451F66CE8289", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*", "matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "4359322B-08D0-4710-A9C3-54BD4A17B800", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*", "matchCriteriaId": "78F84DF4-DBA7-430C-AF17-F52024EF80D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*", "matchCriteriaId": "34266614-3588-485C-A609-37823F8499AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "DD299B8E-D912-4B67-85C3-79CFF4C4F3E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "9890504F-AA2E-44E9-8510-BFFD75FD6D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "38CF30B7-832F-40D4-8DA2-47B55BAC78B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "2072ADDC-C105-49CD-929A-011C8B9C6CB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "A16BE0C5-4569-4F62-AC58-4B4D5B60D935", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc-2:*:*:*:*:*:*", "matchCriteriaId": "D35DD57B-EF77-4C5F-9B44-DAF5E0560E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC8E9FE3-FA25-4054-876E-4A3CE6E71AFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "4BBAEADC-D1DE-46EF-808C-2F6D2A74D988", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEF8EB4B-2947-4BD3-ADF3-345AEFE85B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "E4476FB3-A759-49F5-ABDE-6D2A321B61BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "DFC109C3-2F52-48BE-B07E-3D65F31C1012", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "E54101A9-3967-4111-8A03-DA1BB23141BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "D8B00600-1D45-41F7-9A10-97FB39012FDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "D8CB2331-0F95-45E0-AF5B-0B9C74C5BA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4ADB6A7-76AC-4AE3-B1AA-9F8DFA635418", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "776BC35C-CF37-4F4E-9FD5-EC351D4C2C2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "F10DAABC-FF06-44FB-98EC-B6AD17C03FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "ACA8AFD5-4C7C-4876-93CA-C5B3E881C455", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "547EEB2B-2ECA-4B00-83BB-CFAA11BE0145", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "83829E0F-C24B-4BD6-88EA-98898A9AD86E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4C19141-823E-4057-A699-FD1DFF92DF38", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7FE41-E749-49B8-99DF-19F9E7C4827A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "4E78234B-39B6-4DB4-A10F-AA55F174D4F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "3984CF42-2431-4661-B333-C6721DF7123A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "303CBFC2-22C1-47CE-A26C-A99B05763374", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*", "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D4F88914-6097-4AF1-8337-DCF062EB88AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8BDB49DC-5344-451E-B8D6-D02C3431CE78", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "B1FDA8D3-5082-479B-BA0A-F1E83D750B5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "7305910F-42BA-44CE-A7AC-B6F74200B68D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "B93EB4D6-3375-44BC-870F-714A3BC00C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "52F60D6E-64EB-4223-8A79-595693B444C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*", "matchCriteriaId": "37CF29B9-4397-4298-9326-0443E666CDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "7D85DA34-A977-4A82-8E79-7BFE064DE9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "1476EF7B-A6F8-4B10-AF0F-986EA6BA3116", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "98E222F0-4CAA-4247-A00D-C6CEC2E55198", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "63744245-6126-47F6-B9F5-E936538140C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "C8805BEE-A4CF-45C2-B948-F1E8EF0A0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E474C33-B42A-4BB8-AC57-8A9071316240", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B83B3132-7D78-4AC3-B83A-A6A20AA28993", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0147FCED-AE75-4945-B76E-33F2AA764B9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "9C976AB0-2D1A-40CA-AEC3-E271B59B6960", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "785205F3-88C1-4F63-B091-4920AF1C892D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "879A19B4-C037-407C-AC3F-76D6095E950C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF16907E-5B0A-4312-AB20-0020A6EDFDE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:opensource:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "876044E9-1B51-4877-A92F-63502D17E28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:opensource:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "CBF0F165-E75F-4990-8369-5FD275E453AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:opensource:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "A194CAD2-A056-4664-B24A-0424F69BA1E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:opensource:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "017F1C0D-0469-412A-99B0-70BF8195B148", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:opensource:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "23D0BE8E-1D28-4402-851E-C900E8609898", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "15A0A1ED-5EDB-4D7B-9514-FD92BA00F940", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "56DFDEB7-5220-4501-8499-9114727CD29A", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "27F70E5D-58B9-451D-96E9-CE788B5EEF9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B08893AA-F51D-44CA-97C1-8E7E5A7A7F54", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." }, { "lang": "es", "value": "La implementaci\u00f3n del protocolo IAX2 en Asterisk Open Source v1.2.x antes de v1.2.35, v1.4.x antes de v1.4.26.2, v1.6.0.x antes de v1.6.0.15, v1.6.1.x antes de v1.6.1.x; Business Edition vB.x.x antes de que vB.2.5.10, vC.2.x antes vC.2.4.3 y vC.3.x antes de C.3.1.1; y S800i v1.3.x antes de v1.3.0.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio iniciando muchos intercambios de mensajes IAX2. Se trata de una aunto relacionado con la CVE-2008-3263." } ], "id": "CVE-2009-2346", "lastModified": "2024-11-21T01:04:39.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-08T18:30:00.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36593" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022819" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36275" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://downloads.asterisk.org/pub/security/AST-2009-007.html | Vendor Advisory | |
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2009-3723 | Broken Link, Third Party Advisory | |
secalert@redhat.com | https://security-tracker.debian.org/tracker/CVE-2009-3723 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2009-007.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2009-3723 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2009-3723 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
sangoma | asterisk | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "226CF488-6D48-43F0-907E-4F76184FA293", "versionEndExcluding": "1.6.1.8", "versionStartIncluding": "1.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "asterisk allows calls on prohibited networks" }, { "lang": "es", "value": "asterisk, permite llamadas sobre redes prohibidas" } ], "id": "CVE-2009-3723", "lastModified": "2024-11-21T01:08:03.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-29T19:15:12.377", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2020-001.html | Patch, Vendor Advisory | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-29057 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2020-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-29057 | Exploit, Issue Tracking, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*", "matchCriteriaId": "81C3E390-8B99-4EB8-82DD-02893611209A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "17DB2297-1908-4F87-8046-2BAA74569D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "CEA2CC40-C2F6-4828-82F0-1B50D3E61F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "32F19F43-C1E8-4B6C-9356-AF355B7320BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "21D1FA32-B441-485F-8AE9-F3A394626909", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7795CCF-B160-4B4F-9529-1192C11D7FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "0C5E5D0D-9EB3-40FD-8B7E-E93A95D07AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7DFDA30-DD61-4BBC-AFE4-448BF2A4F303", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*", "matchCriteriaId": "142F1F89-49AC-4A0B-A273-61F697063A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*", "matchCriteriaId": "53041795-788C-4914-A2F6-41539ABE0244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*", "matchCriteriaId": "FBB98E65-B2D0-49A4-8BF3-12155E3E13C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*", "matchCriteriaId": "769C854C-03CD-40A9-B39B-C0CDCA8252EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "19F2741E-7FB6-4817-B44C-57502EF9BE45", "versionEndExcluding": "13.37.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFEF5146-78E5-4391-A789-89E03492FC71", "versionEndExcluding": "16.14.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "EABD6FC4-4053-4925-895B-D539336B47DB", "versionEndExcluding": "17.8.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "338F78D3-1BE4-4876-9E79-1CE45EB28A00", "versionEndExcluding": "18.0.1", "versionStartIncluding": "18.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling." }, { "lang": "es", "value": "Se detect\u00f3 un bloqueo de res_pjsip_session en Asterisk Open Source versiones 13.x anteriores a 13.37.1, versiones 16.x anteriores a 16.14.1, versiones 17.x anteriores a 17.8.1 y versiones 18.x anteriores a 18.0.1.\u0026#xa0;y Certified Asterisk anteriores a 16.8-cert5.\u0026#xa0;Tras recibir una nueva invitaci\u00f3n SIP, Asterisk no devolvi\u00f3 el cuadro de di\u00e1logo dise\u00f1ado bloqueado o referenciado.\u0026#xa0;Esto provoc\u00f3 una brecha entre la creaci\u00f3n del objeto de di\u00e1logo y su pr\u00f3ximo uso por parte del subproceso que lo cre\u00f3.\u0026#xa0;Dependiendo de algunas circunstancias y tiempos fuera de lo nominal, fue posible que otro subproceso liberara dicho cuadro de di\u00e1logo en este espacio.\u0026#xa0;Asterisk podr\u00eda bloquearse cuando el objeto de di\u00e1logo, o cualquiera de sus objetos dependientes, fueran desreferenciados o accedidos a continuaci\u00f3n por el subproceso de creaci\u00f3n inicial.\u0026#xa0;Sin embargo, tome en cuenta que este bloqueo solo puede ocurrir cuando se usa un protocolo orientado a la conexi\u00f3n (por ejemplo, TCP o TLS, pero no UDP) para el transporte SIP.\u0026#xa0;Adem\u00e1s, el cliente remoto debe estar autenticado, o Asterisk debe estar configurado para llamadas an\u00f3nimas" } ], "id": "CVE-2020-28327", "lastModified": "2024-11-21T05:22:33.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-06T19:15:14.080", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29057" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
teluu | pjsip | * | |
asterisk | certified_asterisk | * | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
sangoma | asterisk | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BB0273A-3235-4BC7-A1BE-7D35BABD8617", "versionEndIncluding": "2.11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "02200524-98C1-49E2-8DFE-7BE82E1181E2", "versionEndExcluding": "16.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC49FD2F-9A64-4F92-9B73-50E37BEB207E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "E64BCD44-2298-4710-9CC3-DF82E6A8DF94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "91CCAB0C-C0F8-4619-AAE1-F6F13FF31570", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "F2B7CBB3-E037-416B-AD16-9A553D6A4775", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "DE7DDFE1-6A06-477A-AB45-D00053CFA7EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "A35C117A-6EFB-42EB-AD2A-EA7866606927", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "40003CBE-792F-4875-9E60-6F1CE0BBAA8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "46A7AA7B-13F2-496A-99ED-1CC13234E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "147663CB-B48D-4D89-96BF-F92FF96F347F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "27DBBC83-930A-4ECE-8C1E-47481D881B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "B987A13D-A363-4DCE-BBA1-E35E81ACBA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "01A5B7F9-FAD2-4C0C-937D-CF1086512130", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "F60B4271-F987-4932-86EE-45ED099661E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE99C3B4-20EC-4AC8-9A0A-C690E2DBED99", "versionEndExcluding": "16.24.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C109B569-DE0D-4AE4-A128-239077CCC05F", "versionEndExcluding": "18.10.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "44E4E3A7-8CB3-491C-98F6-F78345533E3B", "versionEndExcluding": "19.2.1", "versionStartIncluding": "19.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim\u2019s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim\u2019s machine. Users are advised to upgrade as soon as possible. There are no known workarounds." }, { "lang": "es", "value": "PJSIP es una biblioteca de comunicaci\u00f3n multimedia gratuita y de c\u00f3digo abierto escrita en lenguaje C que implementa protocolos basados en est\u00e1ndares como SIP, SDP, RTP, STUN, TURN e ICE. En las versiones afectadas, si el mensaje STUN entrante contiene un atributo ERROR-CODE, no se comprueba la longitud del encabezado antes de llevar a cabo una operaci\u00f3n de sustracci\u00f3n, resultando en un escenario de desbordamiento de enteros. Este problema afecta a todos los usuarios que usan STUN. Un actor malicioso situado en la red de la v\u00edctima puede falsificar y enviar un mensaje UDP (STUN) especialmente dise\u00f1ado que podr\u00eda ejecutar remotamente c\u00f3digo arbitrario en la m\u00e1quina de la v\u00edctima. Se aconseja a usuarios que actualicen lo antes posible. No se presentan soluciones conocidas" } ], "id": "CVE-2021-37706", "lastModified": "2024-11-21T06:15:45.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-22T18:15:07.487", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/0" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3632620E-8A6D-4D65-BED9-80C0E7CEA8DD", "versionEndExcluding": "16.29.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F944B1A0-EE6E-4FA3-905D-F37AD20D567B", "versionEndExcluding": "18.15.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1A640E6-6378-4FA4-98B5-C32B5A937F7B", "versionEndExcluding": "19.7.1", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:20.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADB799D3-B6BE-468C-8D3E-B087ED287B24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash." }, { "lang": "es", "value": "En Sangoma Asterisk hasta 16.28.0, 17.x y 18.x hasta 18.14.0, y 19.x hasta 19.6.0, un mensaje de configuraci\u00f3n entrante a addons/ooh323c/src/ooq931.c con una persona que llama o una persona llamada con formato incorrecto IE puede provocar un bloqueo." } ], "id": "CVE-2022-37325", "lastModified": "2024-11-21T07:14:45.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T21:15:10.073", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2023/dsa-5358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2023/dsa-5358" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2017-004.txt | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/98573 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038531 | ||
cve@mitre.org | https://bugs.debian.org/863906 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2017-004.txt | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98573 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038531 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/863906 | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0789649-4E5D-4DC1-9B01-B294B6151085", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "46940409-0771-4ED6-B352-1A43C6208627", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9BA0EB47-07D8-4B65-BD62-EA2B68D64AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B90E3BEB-E683-4F71-A6C8-A1BD53CD6D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "56E29780-8E4A-4CEF-9240-A9AED9BB06AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "715E2B71-425F-42F7-B713-8CC644B1C58A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "97507DA4-6B96-4470-9FFC-DFABED357A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "CCC1991F-9E49-4DAB-B60A-3B172D0F86A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7535B8C1-419E-4E81-9955-7B7FE97FBAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7B22660-489A-4A62-BA61-7E3B153DE7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47134DA6-5D36-43CF-88A4-9142C9497025", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "803258B5-6EF8-4541-B482-00B34668A46E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D9E6F48-96AD-44A0-8E4F-C65E9F82F089", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "70485694-089D-4DF5-AC81-5CABBA5A332E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "88DD3F8C-ACA3-460F-A024-A430D9A9F63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9A3FBACC-C61F-46A6-8C49-8268F6E3F3EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "57094FDA-FDEE-4C5F-BDAB-B4C14E212E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DC918B9-BCE7-4310-B385-77B3D9F398FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42641E1-527B-4A2F-B36A-151C1B769AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F1B7AA0-A5BC-47B7-BAB7-94C18A975938", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FAE04147-C3D3-4C80-AD27-1A24498DBB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "58CE7E95-CC54-4509-8B3F-22498E0FB6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEE9C24-FDC9-4675-A912-24100B48C77C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AF5F5C49-B1F3-43EF-A46B-0B1D6921FD78", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2861956E-7C8F-4A6A-9DC3-E23B12FDFDF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D6097525-B5D5-4ACE-B26E-E976E30D6E80", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B1FC6424-B774-4E3F-B835-72296C37C4EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EEC6D5F3-B6C5-4B35-9EDE-FCBC808D4C6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "589E43EA-6873-48CE-AB83-D3A42E6D8B68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "69C489FB-3A83-42D7-94A9-3C7D5B8F980C", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "DD5636A9-1E9F-4DA7-8459-6B9257ADE0E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "4DDBE806-CDD5-4981-B575-9EB58816CD7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "A9676683-14B7-4489-9D18-C37365C323D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "660E2F8C-A674-44EE-99AC-80E57A0681C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "6949CB9E-8282-4E9D-9DD0-889E3181C845", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "B54BB82E-92EF-4D75-8E62-10CDC7C526DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "E759A991-D72D-4FCA-B4F5-3B51D63A31D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D4E1A5B3-8385-4376-A145-1E1CC0E80818", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "3E4E78FF-000E-4DA8-8539-2C5507C09BB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sangoma:asterisk:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF4B65D-016F-4306-B1AC-AA83B6049D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8C2B545C-0A70-405C-8610-24ADE6740549", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "9B2609D7-C5E8-42C7-A456-F01051A99A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9707B21-1F6F-4817-8ABC-8FA88670B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9A7E5B97-8A5F-4059-8363-F42A2BF5A0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D3283C6-3223-41B0-B823-1BCD23AA05FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "4011C14B-5338-4E13-A2F3-0E585425D5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2CD51694-6DCD-4B5B-B062-DFA3BAA98DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7277A774-C370-4787-B84C-6F4AC55A3487", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E216708E-5BEE-4E03-93EA-6B013B439E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:asterisk:14.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "61028A13-37B5-4BC9-8EFB-D2465B9DECCD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop)." }, { "lang": "es", "value": "Existe una vulnerabilidad de agotamiento de memoria en Asterisk Open Source, en versiones 13.x anteriores a la 13.15.1 y versiones 14.x anteriores a la 14.4.1, y en Certified Asterisk, en versiones 13.13 anteriores a la 13.13-cert4. Esto podr\u00eda llevarse a cabo mediante el env\u00edo de paquetes SCCP especialmente manipulados que provocar\u00edan un bucle infinito y dar\u00edan lugar a un agotamiento de memoria (mediante el registro de mensajes en ese bucle)." } ], "id": "CVE-2017-9358", "lastModified": "2024-11-21T03:35:54.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-02T05:29:00.700", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98573" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1038531" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/863906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/863906" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-2186
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/50687 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/50756 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2012/dsa-2550 | vendor-advisory, x_refsource_DEBIAN | |
http://downloads.asterisk.org/pub/security/AST-2012-012.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1027460 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "50687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50687" }, { "name": "50756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50756" }, { "name": "DSA-2550", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2550" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "name": "1027460", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-31T09:00:00", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "50687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50687" }, { "name": "50756", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50756" }, { "name": "DSA-2550", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2550" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "name": "1027460", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027460" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2012-2186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "50687", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50687" }, { "name": "50756", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50756" }, { "name": "DSA-2550", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2012-012.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "name": "1027460", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027460" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2012-2186", "datePublished": "2012-08-31T14:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:26:08.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2948
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/75937 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1027103 | vdb-entry, x_refsource_SECTRACK | |
http://www.debian.org/security/2012/dsa-2493 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/53723 | vdb-entry, x_refsource_BID | |
http://downloads.asterisk.org/pub/security/AST-2012-008.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/49303 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "asterisk-scd-dos(75937)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "name": "1027103", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027103" }, { "name": "DSA-2493", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2493" }, { "name": "53723", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53723" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "name": "49303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49303" }, { "name": "20120529 AST-2012-008: Skinny Channel Driver Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "asterisk-scd-dos(75937)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "name": "1027103", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027103" }, { "name": "DSA-2493", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2493" }, { "name": "53723", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53723" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "name": "49303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49303" }, { "name": "20120529 AST-2012-008: Skinny Channel Driver Remote Crash Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2948", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "asterisk-scd-dos(75937)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "name": "1027103", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027103" }, { "name": "DSA-2493", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2493" }, { "name": "53723", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53723" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2012-008.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "name": "49303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49303" }, { "name": "20120529 AST-2012-008: Skinny Channel Driver Remote Crash Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2948", "datePublished": "2012-06-02T15:00:00", "dateReserved": "2012-05-29T00:00:00", "dateUpdated": "2024-08-06T19:50:05.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37325
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:20.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-37325", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-08-01T00:00:00", "dateUpdated": "2024-08-03T10:29:20.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42706
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:10:41.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-42706", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-10T00:00:00", "dateUpdated": "2024-08-03T13:10:41.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28242
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://downloads.asterisk.org/pub/security/AST-2020-002.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:58.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "name": "FEDORA-2020-6b277646c7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/" }, { "name": "[debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-03T07:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "name": "FEDORA-2020-6b277646c7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/" }, { "name": "[debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.asterisk.org/pub/security/AST-2020-002.html", "refsource": "MISC", "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "name": "FEDORA-2020-6b277646c7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUS54QTQCYKR36EIULYD544GXDA644HB/" }, { "name": "[debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28242", "datePublished": "2020-11-06T05:02:58", "dateReserved": "2020-11-06T00:00:00", "dateUpdated": "2024-08-04T16:33:58.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12228
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104457 | vdb-entry, x_refsource_BID | |
https://issues.asterisk.org/jira/browse/ASTERISK-27807 | x_refsource_CONFIRM | |
http://downloads.asterisk.org/pub/security/AST-2018-007.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104457", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104457" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-14T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "104457", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104457" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "104457", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104457" }, { "name": "https://issues.asterisk.org/jira/browse/ASTERISK-27807", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2018-007.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-12228", "datePublished": "2018-06-12T04:00:00", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-08-05T08:30:59.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42705
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:10:41.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html" }, { "name": "[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "name": "DSA-5358", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5358" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-42705", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-10-10T00:00:00", "dateUpdated": "2024-08-03T13:10:41.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2346
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1022819 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/506257/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/36593 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/36275 | vdb-entry, x_refsource_BID | |
http://downloads.asterisk.org/pub/security/AST-2009-006.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36275" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022819" }, { "name": "20090903 AST-2009-006: IAX2 Call Number Resource Exhaustion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "name": "36593", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36593" }, { "name": "36275", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36275" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-006.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2346", "datePublished": "2009-09-08T18:00:00", "dateReserved": "2009-07-07T00:00:00", "dateUpdated": "2024-08-07T05:44:55.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3723
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2009-3723 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2009-3723 | x_refsource_MISC | |
http://downloads.asterisk.org/pub/security/AST-2009-007.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:38:30.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "asterisk", "vendor": "asterisk", "versions": [ { "status": "affected", "version": "All 1.6.1 versions" } ] } ], "descriptions": [ { "lang": "en", "value": "asterisk allows calls on prohibited networks" } ], "problemTypes": [ { "descriptions": [ { "description": "calls allowed on prohibited networks in asterisk", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-29T12:42:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-3723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "asterisk", "version": { "version_data": [ { "version_value": "All 1.6.1 versions" } ] } } ] }, "vendor_name": "asterisk" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "asterisk allows calls on prohibited networks" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "calls allowed on prohibited networks in asterisk" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2009-3723", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "name": "https://access.redhat.com/security/cve/cve-2009-3723", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2009-007.html", "refsource": "MISC", "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-3723", "datePublished": "2019-10-29T12:42:08", "dateReserved": "2009-10-16T00:00:00", "dateUpdated": "2024-08-07T06:38:30.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37706
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865" }, { "name": "20220304 AST-2022-004: pjproject: integer underflow on STUN message", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/0" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pjproject", "vendor": "pjsip", "versions": [ { "status": "affected", "version": "\u003c= 2.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim\u2019s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim\u2019s machine. Users are advised to upgrade as soon as possible. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-30T00:06:40.686220", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984" }, { "url": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865" }, { "name": "20220304 AST-2022-004: pjproject: integer underflow on STUN message", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/0" }, { "url": "http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "source": { "advisory": "GHSA-2qpg-f6wf-w984", "discovery": "UNKNOWN" }, "title": "Potential integer underflow upon receiving STUN message in PJSIP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37706", "datePublished": "2021-12-22T00:00:00", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9358
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038531 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/98573 | vdb-entry, x_refsource_BID | |
http://downloads.asterisk.org/pub/security/AST-2017-004.txt | x_refsource_CONFIRM | |
https://bugs.debian.org/863906 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:02:44.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038531", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038531" }, { "name": "98573", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98573" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/863906" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-26T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038531", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038531" }, { "name": "98573", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98573" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/863906" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038531", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038531" }, { "name": "98573", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98573" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "name": "https://bugs.debian.org/863906", "refsource": "CONFIRM", "url": "https://bugs.debian.org/863906" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-9358", "datePublished": "2017-06-02T05:04:00", "dateReserved": "2017-06-01T00:00:00", "dateUpdated": "2024-08-05T17:02:44.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21723
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:53:35.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896" }, { "name": "20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/2" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pjproject", "vendor": "pjsip", "versions": [ { "status": "affected", "version": "\u003c= 2.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-30T00:06:29.216130", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm" }, { "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896" }, { "name": "20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/2" }, { "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "source": { "advisory": "GHSA-7fw8-54cv-r7pm", "discovery": "UNKNOWN" }, "title": "Out-of-bounds read in multipart parsing in PJSIP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21723", "datePublished": "2022-01-27T00:00:00", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:53:35.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23608
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f" }, { "name": "20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/1" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "[debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pjproject", "vendor": "pjsip", "versions": [ { "status": "affected", "version": "\u003c= 2.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-30T00:06:27.525525", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62" }, { "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f" }, { "name": "20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/1" }, { "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html" }, { "name": "[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "name": "[debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html" }, { "name": "GLSA-202210-37", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-37" }, { "name": "[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "name": "DSA-5285", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "name": "[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" } ], "source": { "advisory": "GHSA-ffff-m5fm-qm62", "discovery": "UNKNOWN" }, "title": "Use after free in PJSIP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23608", "datePublished": "2022-02-22T00:00:00", "dateReserved": "2022-01-19T00:00:00", "dateUpdated": "2024-08-03T03:43:46.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28327
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://downloads.asterisk.org/pub/security/AST-2020-001.html | x_refsource_MISC | |
https://issues.asterisk.org/jira/browse/ASTERISK-29057 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:58.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29057" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-10T15:31:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29057" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.asterisk.org/pub/security/AST-2020-001.html", "refsource": "MISC", "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "name": "https://issues.asterisk.org/jira/browse/ASTERISK-29057", "refsource": "MISC", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29057" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28327", "datePublished": "2020-11-06T18:08:07", "dateReserved": "2020-11-06T00:00:00", "dateUpdated": "2024-08-04T16:33:58.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-49215
Vulnerability from cvelistv5
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-49294. Reason: This candidate is a reservation duplicate of CVE-2023-49294. Notes: All CVE users should reference CVE-2023-49294 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-12-09T22:36:11.613174Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "rejectedReasons": [ { "lang": "en", "value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-49294. Reason: This candidate is a reservation duplicate of CVE-2023-49294. Notes: All CVE users should reference CVE-2023-49294 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-49215", "datePublished": "2024-10-21T00:00:00", "dateRejected": "2024-12-09T00:00:00", "dateReserved": "2024-10-14T00:00:00", "dateUpdated": "2024-12-09T22:36:11.613174Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201911-0701
Vulnerability from variot
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voice mail, multi-party voice conferencing, interactive voice response (IVR), and more. An attacker could use this vulnerability to cause a denial of service.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
Exploits Known No
Reported On October 17, 2019
Reported By Andrey V. T.
Modules Affected channels/chan_sip.c
Resolution Using any other option value for “nat” will prevent the
attack (such as “nat=no” or “nat=force_rport”), but will
need to be tested on an individual basis to ensure that it
works for the user’s deployment. On the fixed versions of
Asterisk, it will no longer set the address of the peer
before authentication is successful when a SIP request comes
in.
Affected Versions
Product Release
Series
Asterisk Open Source 13.x All releases
Asterisk Open Source 16.x All releases
Asterisk Open Source 17.x All releases
Certified Asterisk 13.21 All releases
Corrected In
Product Release
Asterisk Open Source 13.29.2
Asterisk Open Source 16.6.2
Asterisk Open Source 17.0.1
Certified Asterisk 13.21-cert5
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2019-006-13.diff Asterisk 13
http://downloads.asterisk.org/pub/security/AST-2019-006-16.diff Asterisk 16
http://downloads.asterisk.org/pub/security/AST-2019-006-17.diff Asterisk 17
http://downloads.asterisk.org/pub/security/AST-2019-006-13.21.diff Certified
Asterisk
13.21-cert5
Links https://issues.asterisk.org/jira/browse/ASTERISK-28589
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2019-006.pdf and
http://downloads.digium.com/pub/security/AST-2019-006.html
Revision History
Date Editor Revisions Made
October 22, 2019 Ben Ford Initial Revision
November 14, 2019 Ben Ford Corrected and updated fields for
versioning, and added CVE
November 21, 2019 Ben Ford Added “Posted On” date
Asterisk Project Security Advisory - AST-2019-006
Copyright © 2019 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-0701", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "13.29.2" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "digium", "version": "13.21.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "16.6.2" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "17.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "13.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "17.0.1" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "13.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "16.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "17.x" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "13.21" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=13.*" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=16.*" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=17.*" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.6, "vendor": "sangoma", "version": "13.21" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:asterisk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012588" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bford", "sources": [ { "db": "PACKETSTORM", "id": "155434" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" } ], "trust": 0.7 }, "cve": "CVE-2019-18790", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-18790", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2020-03059", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-18790", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-18790", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-18790", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-18790", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-03059", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-1291", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer\u0027s IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer\u0027s name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voice mail, multi-party voice conferencing, interactive voice response (IVR), and more. An attacker could use this vulnerability to cause a denial of service. \n Nature of Advisory Denial of Service \n Susceptibility Remote Unauthenticated Sessions \n Severity Minor \n Exploits Known No \n Reported On October 17, 2019 \n Reported By Andrey V. T. \n Modules Affected channels/chan_sip.c \n\n Resolution Using any other option value for \u201cnat\u201d will prevent the \n attack (such as \u201cnat=no\u201d or \u201cnat=force_rport\u201d), but will \n need to be tested on an individual basis to ensure that it \n works for the user\u2019s deployment. On the fixed versions of \n Asterisk, it will no longer set the address of the peer \n before authentication is successful when a SIP request comes \n in. \n\n Affected Versions \n Product Release \n Series \n Asterisk Open Source 13.x All releases \n Asterisk Open Source 16.x All releases \n Asterisk Open Source 17.x All releases \n Certified Asterisk 13.21 All releases \n\n Corrected In \n Product Release \n Asterisk Open Source 13.29.2 \n Asterisk Open Source 16.6.2 \n Asterisk Open Source 17.0.1 \n Certified Asterisk 13.21-cert5 \n\n Patches \n SVN URL Revision \n http://downloads.asterisk.org/pub/security/AST-2019-006-13.diff Asterisk 13 \n http://downloads.asterisk.org/pub/security/AST-2019-006-16.diff Asterisk 16 \n http://downloads.asterisk.org/pub/security/AST-2019-006-17.diff Asterisk 17 \n http://downloads.asterisk.org/pub/security/AST-2019-006-13.21.diff Certified \n Asterisk \n 13.21-cert5 \n\n Links https://issues.asterisk.org/jira/browse/ASTERISK-28589 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n http://downloads.digium.com/pub/security/AST-2019-006.pdf and \n http://downloads.digium.com/pub/security/AST-2019-006.html \n\n Revision History\n Date Editor Revisions Made \n October 22, 2019 Ben Ford Initial Revision \n November 14, 2019 Ben Ford Corrected and updated fields for \n versioning, and added CVE \n November 21, 2019 Ben Ford Added \u201cPosted On\u201d date \n\n Asterisk Project Security Advisory - AST-2019-006\n Copyright \u00a9 2019 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form", "sources": [ { "db": "NVD", "id": "CVE-2019-18790" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "PACKETSTORM", "id": "155434" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18790", "trust": 3.1 }, { "db": "DLINK", "id": "SAP10005", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-012588", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "155434", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-03059", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4526", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4421", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-1291", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "PACKETSTORM", "id": "155434" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "id": "VAR-201911-0701", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" } ], "trust": 0.948297215 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" } ] }, "last_update_date": "2024-11-23T21:52:07.567000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2019-006", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2019-006.html" }, { "title": "Security Advisories", "trust": 0.8, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "title": "[SECURITY] [DLA 2017-1] asterisk security update", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "title": "Patch for Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/196959" }, { "title": "Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103433" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "trust": 1.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18790" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18790" }, { "trust": 0.8, "url": "https://web.archive.org/web/20131208091355/http://securityadvisories.dlink.com/security/publication.aspx?name=sap10005" }, { "trust": 0.6, "url": "https://seclists.org/fulldisclosure/2019/nov/18" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-008.html" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007.html" }, { "trust": 0.6, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html second message url unavailable at time of publishing" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4526/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-information-disclosure-via-sip-peer-ip-address-change-30935" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4421/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155434/asterisk-project-security-advisory-ast-2019-006.html" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2019-006.html" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-28589" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006-16.diff" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006-13.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006-17.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006-13.21.diff" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2019-006.pdf" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "PACKETSTORM", "id": "155434" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-03059" }, { "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "db": "PACKETSTORM", "id": "155434" }, { "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "db": "NVD", "id": "CVE-2019-18790" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2020-03059" }, { "date": "2019-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "date": "2019-11-21T23:02:22", "db": "PACKETSTORM", "id": "155434" }, { "date": "2019-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "date": "2019-11-22T17:15:11.740000", "db": "NVD", "id": "CVE-2019-18790" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2020-03059" }, { "date": "2019-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012588" }, { "date": "2022-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1291" }, { "date": "2024-11-21T04:33:34.090000", "db": "NVD", "id": "CVE-2019-18790" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1291" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sangoma Asterisk and Certified Asterisk Vulnerabilities related to lack of authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1291" } ], "trust": 0.6 } }
var-202212-0159
Vulnerability from variot
A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5358-1 security@debian.org https://www.debian.org/security/ Markus Koschany February 23, 2023 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325 CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706
Multiple security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for launching a denial of service attack or the execution of arbitrary code.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u2.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmP3LTtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQLpw/8CshgHqfiBn5zx4yxf0mmnHaeXDpDmebNz0MLPJQOBHLn6IBFyAu+TpM5 o9CgBlgTx6LdXToik+0QQtG50EnCp+2gPQ+dalY7lHswTfdwqIrMIM8NUwtOo9ut DUUptPBTbUVDICh/OZfiNE3EfxAJ5Z6ktoqC/L8IqCx/S1ZwbdQJSVXAAQJJUVyT syXDNHpoYqehm6p0JKOAbYkROnCKyvfhrtu9clZgUx0lhlxGRpAMspO15mUTyxqR xLwsWAqWyfPXTZBpa6Ym8Aa8vQeDrvk3QakigvhnYHxhz51eJiH8WcsIzh2NQLW0 CsJHYx+Hq3rVUHpIWvPyR00HeKfGNu4pYzXS8RAhuKricEgxNWEQKWxYO76+xrWt avZ1ebREYG2+6AcneB3ceSCPNEg3YeySmf5RyFYy+3s307OsA8/kbSwzsi4lmBZe 1+bqDZvcb76dEz2d5bFaC9qJ3EUX3C19B4mo/bi+IW4s8YypZZX3OpmH5jCkIFKF XiEmuDj3rtrDYSzQgSCKgflXQIv63UsUn3NbZk2KIkQTZRpBfT8p5M7DWwozOCbO 9CN6gsjkM/H+YT2FfEdXMsqw7H6tl3wv1HUIj9dDaAYfxfnHGMfe3jeSBA84Ql1J +NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0159", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.14.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "18.9" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.6.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "20.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.15.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.29.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.7.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-42705" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian", "sources": [ { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.1 }, "cve": "CVE-2022-42705", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-42705", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-42705", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2174", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "db": "NVD", "id": "CVE-2022-42705" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5358-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nFebruary 23, 2023 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325\n CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706\n\nMultiple security vulnerabilities have been discovered in Asterisk, an Open\nSource Private Branch Exchange. Buffer overflows and other programming errors\ncould be exploited for launching a denial of service attack or the execution of\narbitrary code. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u2. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmP3LTtfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD\nRjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7\nUeQLpw/8CshgHqfiBn5zx4yxf0mmnHaeXDpDmebNz0MLPJQOBHLn6IBFyAu+TpM5\no9CgBlgTx6LdXToik+0QQtG50EnCp+2gPQ+dalY7lHswTfdwqIrMIM8NUwtOo9ut\nDUUptPBTbUVDICh/OZfiNE3EfxAJ5Z6ktoqC/L8IqCx/S1ZwbdQJSVXAAQJJUVyT\nsyXDNHpoYqehm6p0JKOAbYkROnCKyvfhrtu9clZgUx0lhlxGRpAMspO15mUTyxqR\nxLwsWAqWyfPXTZBpa6Ym8Aa8vQeDrvk3QakigvhnYHxhz51eJiH8WcsIzh2NQLW0\nCsJHYx+Hq3rVUHpIWvPyR00HeKfGNu4pYzXS8RAhuKricEgxNWEQKWxYO76+xrWt\navZ1ebREYG2+6AcneB3ceSCPNEg3YeySmf5RyFYy+3s307OsA8/kbSwzsi4lmBZe\n1+bqDZvcb76dEz2d5bFaC9qJ3EUX3C19B4mo/bi+IW4s8YypZZX3OpmH5jCkIFKF\nXiEmuDj3rtrDYSzQgSCKgflXQIv63UsUn3NbZk2KIkQTZRpBfT8p5M7DWwozOCbO\n9CN6gsjkM/H+YT2FfEdXMsqw7H6tl3wv1HUIj9dDaAYfxfnHGMfe3jeSBA84Ql1J\n+NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2022-42705" }, { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-42705", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2023.1153", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.6288", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202212-2174", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "171105", "trust": 0.1 } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "db": "NVD", "id": "CVE-2022-42705" } ] }, "id": "VAR-202212-0159", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.75 }, "last_update_date": "2024-08-14T12:11:36.808000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Asterisk Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=216717" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2174" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-42705" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.debian.org/security/2023/dsa-5358" }, { "trust": 1.6, "url": "https://downloads.asterisk.org/pub/security/ast-2022-008.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6288" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-open-source-reuse-after-free-via-res-pjsip-pubsub-c-40001" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.1153" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-42705/" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37325" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42705" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42706" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23537" } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "db": "NVD", "id": "CVE-2022-42705" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "db": "NVD", "id": "CVE-2022-42705" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-23T16:33:14", "db": "PACKETSTORM", "id": "171105" }, { "date": "2022-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "date": "2022-12-05T21:15:10.177000", "db": "NVD", "id": "CVE-2022-42705" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2174" }, { "date": "2023-02-24T00:15:12.057000", "db": "NVD", "id": "CVE-2022-42705" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2174" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2174" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2174" } ], "trust": 0.6 } }
var-201910-0001
Vulnerability from variot
asterisk allows calls on prohibited networks. asterisk Contains an unauthorized authentication vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0001", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1.8" }, { "model": "open source", "scope": null, "trust": 0.8, "vendor": "asterisk", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "1.6.1.4" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "1.6.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:asterisk:open_source", "vulnerable": true }, { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" } ] }, "cve": "CVE-2009-3723", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2009-3723", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2009-3723", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-3723", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-3723", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2009-3723", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201910-1671", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "asterisk allows calls on prohibited networks. asterisk Contains an unauthorized authentication vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2009-3723" }, { "db": "JVNDB", "id": "JVNDB-2009-006633" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-3723", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2009-006633", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201910-1671", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "id": "VAR-201910-0001", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-08-16T23:00:11.415000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2009-007", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2009-007.html" }, { "title": "CVE-2009-3723", "trust": 0.8, "url": "https://security-tracker.debian.org/tracker/CVE-2009-3723" }, { "title": "Digium Asterisk Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=101439" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-863", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://security-tracker.debian.org/tracker/cve-2009-3723" }, { "trust": 1.6, "url": "https://access.redhat.com/security/cve/cve-2009-3723" }, { "trust": 1.6, "url": "http://downloads.asterisk.org/pub/security/ast-2009-007.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3723" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3723" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "db": "NVD", "id": "CVE-2009-3723" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "date": "2019-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "date": "2019-10-29T19:15:12.377000", "db": "NVD", "id": "CVE-2009-3723" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-006633" }, { "date": "2019-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1671" }, { "date": "2024-08-15T12:44:24.983000", "db": "NVD", "id": "CVE-2009-3723" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1671" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "asterisk Vulnerable to unauthorized authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-006633" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1671" } ], "trust": 0.6 } }
var-202201-0582
Vulnerability from variot
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the master
branch. There are no known workarounds. PJSIP Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-006
Product Asterisk
Summary pjproject: unconstrained malformed multipart SIP
message
Nature of Advisory Out of bounds memory access
Susceptibility Remote unauthenticated sessions
Severity Minor
Exploits Known Yes
Reported On March 3, 2022
Reported By Sauw Ming
Posted On March 4, 2022
Last Updated On March 3, 2022
Advisory Contact kharwell AT sangoma DOT com
CVE Name CVE-2022-21723
Description If an incoming SIP message contains a malformed
multi-part body an out of bounds read access may
occur, which can result in undefined behavior. Note,
it’s currently uncertain if there is any externally
exploitable vector within Asterisk for this issue, but
providing this as a security issue out of caution.
Modules Affected bundled pjproject
Resolution If you use “with-pjproject-bundled” then upgrade to, or
install one of, the versions of Asterisk listed below.
Otherwise install the appropriate version of pjproject that
contains the patch.
Affected Versions
Product Release Series
Asterisk Open Source 16.x All versions
Asterisk Open Source 18.x All versions
Asterisk Open Source 19.x All versions
Certified Asterisk 16.x All versions
Corrected In
Product Release
Asterisk Open Source 16.24.1,18.10.1,19.2.1
Certified Asterisk 16.8-cert13
Patches
Patch URL Revision
https://downloads.digium.com/pub/security/AST-2022-006-16.diff Asterisk
16
https://downloads.digium.com/pub/security/AST-2022-006-18.diff Asterisk
18
https://downloads.digium.com/pub/security/AST-2022-006-19.diff Asterisk
19
https://downloads.digium.com/pub/security/AST-2022-006-16.8.diff Certified
Asterisk
16.8
Links https://issues.asterisk.org/jira/browse/ASTERISK-29945
https://downloads.asterisk.org/pub/security/AST-2022-006.html
https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
https://downloads.digium.com/pub/security/AST-2022-006.pdf and
https://downloads.digium.com/pub/security/AST-2022-006.html
Revision History
Date Editor Revisions Made
March 3, 2022 Kevin Harwell Initial revision
Asterisk Project Security Advisory - AST-2022-006
Copyright © 2022 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-37
https://security.gentoo.org/
Severity: Normal Title: PJSIP: Multiple Vulnerabilities Date: October 31, 2022 Bugs: #803614, #829894, #875863 ID: 202210-37
Synopsis
Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/pjproject < 2.12.1 >= 2.12.1
Description
Multiple vulnerabilities have been discovered in PJSIP. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Resolution
All PJSIP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.12.1"
References
[ 1 ] CVE-2021-32686 https://nvd.nist.gov/vuln/detail/CVE-2021-32686 [ 2 ] CVE-2021-37706 https://nvd.nist.gov/vuln/detail/CVE-2021-37706 [ 3 ] CVE-2021-41141 https://nvd.nist.gov/vuln/detail/CVE-2021-41141 [ 4 ] CVE-2021-43804 https://nvd.nist.gov/vuln/detail/CVE-2021-43804 [ 5 ] CVE-2021-43845 https://nvd.nist.gov/vuln/detail/CVE-2021-43845 [ 6 ] CVE-2022-21722 https://nvd.nist.gov/vuln/detail/CVE-2022-21722 [ 7 ] CVE-2022-21723 https://nvd.nist.gov/vuln/detail/CVE-2022-21723 [ 8 ] CVE-2022-23608 https://nvd.nist.gov/vuln/detail/CVE-2022-23608 [ 9 ] CVE-2022-24754 https://nvd.nist.gov/vuln/detail/CVE-2022-24754 [ 10 ] CVE-2022-24763 https://nvd.nist.gov/vuln/detail/CVE-2022-24763 [ 11 ] CVE-2022-24764 https://nvd.nist.gov/vuln/detail/CVE-2022-24764 [ 12 ] CVE-2022-24786 https://nvd.nist.gov/vuln/detail/CVE-2022-24786 [ 13 ] CVE-2022-24792 https://nvd.nist.gov/vuln/detail/CVE-2022-24792 [ 14 ] CVE-2022-24793 https://nvd.nist.gov/vuln/detail/CVE-2022-24793 [ 15 ] CVE-2022-31031 https://nvd.nist.gov/vuln/detail/CVE-2022-31031 [ 16 ] CVE-2022-39244 https://nvd.nist.gov/vuln/detail/CVE-2022-39244 [ 17 ] CVE-2022-39269 https://nvd.nist.gov/vuln/detail/CVE-2022-39269
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-37
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5285-1 security@debian.org https://www.debian.org/security/ Markus Koschany November 17, 2022 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608 CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792 CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651 Debian Bug : 1014998 1018073 1014976
Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code.
Special care should be taken when upgrading to this new upstream release. Some configuration files and options have changed in order to remedy certain security vulnerabilities. Most notably the pjsip TLS listener only accepts TLSv1.3 connections in the default configuration now. This can be reverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also https://issues.asterisk.org/jira/browse/ASTERISK-29017.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u1.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmN2qoFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeR0pQ/+Kr+FWFeFyrkFTyVv5BGBJug+EvZzzC2JZoI/TNsiAWQi/BZTQJ0pmdZr EHokqN7Z35EqZW6sj5aypdK7bOv4N+uv6P59xROk1KjEEG6XttGJ2BUvffWYWEXo k6+ou/yfAxU72Ufd1eOcMtjyGeN0CljmemIJ5Cywpnaw8YArP+VzRK2NEth0gCmJ TAfSvIPFaS7jB6fEg8KESOpmvtlqEJUh5sjP2t+OOEc3AoNBBuj4ZC44SQ1nif6k jEbmLFnJYQF8dP+IasZ3SY80N+BeuGiylZQ6w1ZvuYuUAK3jhHQ3CJvTQ4sEqNQV Zva6t0kHOEKVxKg412oEpQ0ihR+EBF/lnECu7iR2HTKk8xteNwio5qeeW/joTAJx OTYlHTtERTZIiaHdmV3nmGYgrTLeDHClilCnJrQuyXF+LVHjxBWDh7WS83zSrdIH gNP0eZ5UEjrpomf1yKqHVUsji63eSWACdFVXJLACMwpuevq8qgV6zASD+VuUd36r foEOKVj+FIHehWSef9pP48Na8bOn0EDVqtZEPOjE6o8Y8PjgSf7BSNogppZncldw VREox9NsxGM9hSVh3lVBWL8lT76HQVzXjfXXXoIEFDiGokNRV/dNTuhhb/mh0zxr VTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\xeajm -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0582", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.24.1" }, { "model": "pjsip", "scope": "lte", "trust": 1.0, "vendor": "teluu", "version": "2.11.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.2.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.10.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "certified asterisk", "scope": null, "trust": 0.8, "vendor": "asterisk", "version": null }, { "model": "pjsip", "scope": "lte", "trust": 0.8, "vendor": "teluu", "version": "2.11.1 and earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kevin Harwell, Sauw Ming", "sources": [ { "db": "PACKETSTORM", "id": "166227" } ], "trust": 0.1 }, "cve": "CVE-2022-21723", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-21723", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-21723", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-004350", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-21723", "trust": 1.0, "value": "CRITICAL" }, { "author": "security-advisories@github.com", "id": "CVE-2022-21723", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-21723", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202201-2496", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2022-21723", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "db": "NVD", "id": "CVE-2022-21723" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds. PJSIP Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-006\n\n Product Asterisk \n Summary pjproject: unconstrained malformed multipart SIP \n message \n Nature of Advisory Out of bounds memory access \n Susceptibility Remote unauthenticated sessions \n Severity Minor \n Exploits Known Yes \n Reported On March 3, 2022 \n Reported By Sauw Ming \n Posted On March 4, 2022 \n Last Updated On March 3, 2022 \n Advisory Contact kharwell AT sangoma DOT com \n CVE Name CVE-2022-21723 \n\n Description If an incoming SIP message contains a malformed \n multi-part body an out of bounds read access may \n occur, which can result in undefined behavior. Note, \n it\u2019s currently uncertain if there is any externally \n exploitable vector within Asterisk for this issue, but \n providing this as a security issue out of caution. \n Modules Affected bundled pjproject \n\n Resolution If you use \u201cwith-pjproject-bundled\u201d then upgrade to, or \n install one of, the versions of Asterisk listed below. \n Otherwise install the appropriate version of pjproject that \n contains the patch. \n\n Affected Versions\n Product Release Series \n Asterisk Open Source 16.x All versions \n Asterisk Open Source 18.x All versions \n Asterisk Open Source 19.x All versions \n Certified Asterisk 16.x All versions \n\n Corrected In\n Product Release \n Asterisk Open Source 16.24.1,18.10.1,19.2.1 \n Certified Asterisk 16.8-cert13 \n\n Patches \n Patch URL Revision \n https://downloads.digium.com/pub/security/AST-2022-006-16.diff Asterisk \n 16 \n https://downloads.digium.com/pub/security/AST-2022-006-18.diff Asterisk \n 18 \n https://downloads.digium.com/pub/security/AST-2022-006-19.diff Asterisk \n 19 \n https://downloads.digium.com/pub/security/AST-2022-006-16.8.diff Certified \n Asterisk \n 16.8 \n\nLinks https://issues.asterisk.org/jira/browse/ASTERISK-29945 \n \n https://downloads.asterisk.org/pub/security/AST-2022-006.html \n \n https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n https://downloads.digium.com/pub/security/AST-2022-006.pdf and \n https://downloads.digium.com/pub/security/AST-2022-006.html \n\n Revision History\n Date Editor Revisions Made \n March 3, 2022 Kevin Harwell Initial revision \n\n Asterisk Project Security Advisory - AST-2022-006\n Copyright \u00a9 2022 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202210-37\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: PJSIP: Multiple Vulnerabilities\n Date: October 31, 2022\n Bugs: #803614, #829894, #875863\n ID: 202210-37\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been found in PJSIP, the worst of which\ncould result in arbitrary code execution. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/pjproject \u003c 2.12.1 \u003e= 2.12.1\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in PJSIP. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nResolution\n=========\nAll PJSIP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/pjproject-2.12.1\"\n\nReferences\n=========\n[ 1 ] CVE-2021-32686\n https://nvd.nist.gov/vuln/detail/CVE-2021-32686\n[ 2 ] CVE-2021-37706\n https://nvd.nist.gov/vuln/detail/CVE-2021-37706\n[ 3 ] CVE-2021-41141\n https://nvd.nist.gov/vuln/detail/CVE-2021-41141\n[ 4 ] CVE-2021-43804\n https://nvd.nist.gov/vuln/detail/CVE-2021-43804\n[ 5 ] CVE-2021-43845\n https://nvd.nist.gov/vuln/detail/CVE-2021-43845\n[ 6 ] CVE-2022-21722\n https://nvd.nist.gov/vuln/detail/CVE-2022-21722\n[ 7 ] CVE-2022-21723\n https://nvd.nist.gov/vuln/detail/CVE-2022-21723\n[ 8 ] CVE-2022-23608\n https://nvd.nist.gov/vuln/detail/CVE-2022-23608\n[ 9 ] CVE-2022-24754\n https://nvd.nist.gov/vuln/detail/CVE-2022-24754\n[ 10 ] CVE-2022-24763\n https://nvd.nist.gov/vuln/detail/CVE-2022-24763\n[ 11 ] CVE-2022-24764\n https://nvd.nist.gov/vuln/detail/CVE-2022-24764\n[ 12 ] CVE-2022-24786\n https://nvd.nist.gov/vuln/detail/CVE-2022-24786\n[ 13 ] CVE-2022-24792\n https://nvd.nist.gov/vuln/detail/CVE-2022-24792\n[ 14 ] CVE-2022-24793\n https://nvd.nist.gov/vuln/detail/CVE-2022-24793\n[ 15 ] CVE-2022-31031\n https://nvd.nist.gov/vuln/detail/CVE-2022-31031\n[ 16 ] CVE-2022-39244\n https://nvd.nist.gov/vuln/detail/CVE-2022-39244\n[ 17 ] CVE-2022-39269\n https://nvd.nist.gov/vuln/detail/CVE-2022-39269\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202210-37\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5285-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nNovember 17, 2022 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301\n CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845\n CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608\n CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792\n CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651\nDebian Bug : 1014998 1018073 1014976\n\nMultiple security vulnerabilities have been found in Asterisk, an Open Source\nPrivate Branch Exchange. Buffer overflows and other programming errors could be\nexploited for information disclosure or the execution of arbitrary code. \n\nSpecial care should be taken when upgrading to this new upstream release. \nSome configuration files and options have changed in order to remedy\ncertain security vulnerabilities. Most notably the pjsip TLS listener only\naccepts TLSv1.3 connections in the default configuration now. This can be\nreverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also\nhttps://issues.asterisk.org/jira/browse/ASTERISK-29017. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nVTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\\xeajm\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "PACKETSTORM", "id": "166227" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-21723", "trust": 3.6 }, { "db": "PACKETSTORM", "id": "166227", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2022-004350", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "169618", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169938", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022022414", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022030601", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0943", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-2496", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-21723", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "PACKETSTORM", "id": "166227" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "id": "VAR-202201-0582", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T21:31:50.767000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Merge\u00a0pull\u00a0request\u00a0from\u00a0GHSA-7fw8-54cv-r7pm GitHub", "trust": 0.8, "url": "https://www.asterisk.org/products/software/certified-asterisk/" }, { "title": "PJSIP Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=179686" }, { "title": "Debian CVElist Bug Report Logs: ring: CVE-2021-32686 CVE-2021-37706 CVE-2022-21723 CVE-2022-23608 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 CVE-2022-24754 CVE-2022-24763 CVE-2022-24764 CVE-2022-24793", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4e89fc7b47aa12e94340b2e2db73b906" }, { "title": "Debian Security Advisories: DSA-5285-1 asterisk -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=edc2cf0db8c0593c65c4c82227026727" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "CNNVD", "id": "CNNVD-202201-2496" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/mar/2" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/166227/asterisk-project-security-advisory-ast-2022-006.html" }, { "trust": 1.8, "url": "https://github.com/pjsip/pjproject/security/advisories/ghsa-7fw8-54cv-r7pm" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/202210-37" }, { "trust": 1.8, "url": "https://www.debian.org/security/2022/dsa-5285" }, { "trust": 1.7, "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "trust": 1.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21723" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169618/gentoo-linux-security-advisory-202210-37.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0943" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169938/debian-security-advisory-5285-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022022414" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-out-of-bounds-memory-reading-via-pjproject-multipart-sip-message-37714" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022030601" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43804" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23608" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43845" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24764" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21722" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37706" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24763" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006.html" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006.pdf" }, { "trust": 0.1, "url": "https://downloads.asterisk.org/pub/security/ast-2022-006.html" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29945" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006-19.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006-16.8.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006-16.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-006-18.diff" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24793" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24754" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24786" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24792" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32686" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46837" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43301" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29017." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43300" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43302" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "PACKETSTORM", "id": "166227" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-21723" }, { "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "db": "PACKETSTORM", "id": "166227" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "db": "NVD", "id": "CVE-2022-21723" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-27T00:00:00", "db": "VULMON", "id": "CVE-2022-21723" }, { "date": "2023-04-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "date": "2022-03-07T16:29:41", "db": "PACKETSTORM", "id": "166227" }, { "date": "2022-11-01T13:21:55", "db": "PACKETSTORM", "id": "169618" }, { "date": "2022-11-18T14:28:10", "db": "PACKETSTORM", "id": "169938" }, { "date": "2022-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "date": "2022-01-27T00:15:07.737000", "db": "NVD", "id": "CVE-2022-21723" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-08-30T00:00:00", "db": "VULMON", "id": "CVE-2022-21723" }, { "date": "2023-04-10T01:24:00", "db": "JVNDB", "id": "JVNDB-2022-004350" }, { "date": "2022-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2496" }, { "date": "2024-11-21T06:45:18.580000", "db": "NVD", "id": "CVE-2022-21723" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2496" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PJSIP\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004350" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2496" } ], "trust": 0.6 } }
var-202011-0887
Vulnerability from variot
An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-0887", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "13.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0" }, { "model": "certified asterisk", "scope": "lte", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "13.37.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.0.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "17.8.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.14.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "17.0" }, { "model": "asterisk open source", "scope": null, "trust": 0.8, "vendor": "digium", "version": null }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "16.8-cert5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "cve": "CVE-2020-28242", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2020-28242", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-28242", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-28242", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28242", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-28242", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202011-675", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "CNNVD", "id": "CNNVD-202011-675" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur", "sources": [ { "db": "NVD", "id": "CVE-2020-28242" }, { "db": "JVNDB", "id": "JVNDB-2020-013387" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28242", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-013387", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202011-675", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "CNNVD", "id": "CNNVD-202011-675" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "id": "VAR-202011-0887", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T22:11:15.384000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2020-002", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2020-002.html" }, { "title": "Digium Asterisk Open Source and Certified Asterisk Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135266" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "CNNVD", "id": "CNNVD-202011-675" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-674", "trust": 1.0 }, { "problemtype": "Inappropriate recursive control (CWE-674) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://downloads.asterisk.org/pub/security/ast-2020-002.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28242" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qus54qtqcykr36eiulyd544gxda644hb/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qus54qtqcykr36eiulyd544gxda644hb/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "CNNVD", "id": "CNNVD-202011-675" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "db": "CNNVD", "id": "CNNVD-202011-675" }, { "db": "NVD", "id": "CVE-2020-28242" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "date": "2020-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-675" }, { "date": "2020-11-06T06:15:11.930000", "db": "NVD", "id": "CVE-2020-28242" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-29T08:35:00", "db": "JVNDB", "id": "JVNDB-2020-013387" }, { "date": "2022-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-675" }, { "date": "2024-11-21T05:22:30.340000", "db": "NVD", "id": "CVE-2020-28242" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-675" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk\u00a0Open\u00a0Source\u00a0 and \u00a0Certified\u00a0Asterisk\u00a0 Recursion control vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013387" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-675" } ], "trust": 0.6 } }
var-202212-0160
Vulnerability from variot
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5358-1 security@debian.org https://www.debian.org/security/ Markus Koschany February 23, 2023 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325 CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706
Multiple security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for launching a denial of service attack or the execution of arbitrary code.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u2.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmP3LTtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQLpw/8CshgHqfiBn5zx4yxf0mmnHaeXDpDmebNz0MLPJQOBHLn6IBFyAu+TpM5 o9CgBlgTx6LdXToik+0QQtG50EnCp+2gPQ+dalY7lHswTfdwqIrMIM8NUwtOo9ut DUUptPBTbUVDICh/OZfiNE3EfxAJ5Z6ktoqC/L8IqCx/S1ZwbdQJSVXAAQJJUVyT syXDNHpoYqehm6p0JKOAbYkROnCKyvfhrtu9clZgUx0lhlxGRpAMspO15mUTyxqR xLwsWAqWyfPXTZBpa6Ym8Aa8vQeDrvk3QakigvhnYHxhz51eJiH8WcsIzh2NQLW0 CsJHYx+Hq3rVUHpIWvPyR00HeKfGNu4pYzXS8RAhuKricEgxNWEQKWxYO76+xrWt avZ1ebREYG2+6AcneB3ceSCPNEg3YeySmf5RyFYy+3s307OsA8/kbSwzsi4lmBZe 1+bqDZvcb76dEz2d5bFaC9qJ3EUX3C19B4mo/bi+IW4s8YypZZX3OpmH5jCkIFKF XiEmuDj3rtrDYSzQgSCKgflXQIv63UsUn3NbZk2KIkQTZRpBfT8p5M7DWwozOCbO 9CN6gsjkM/H+YT2FfEdXMsqw7H6tl3wv1HUIj9dDaAYfxfnHGMfe3jeSBA84Ql1J +NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0160", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "20.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.15.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.29.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.7.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37325" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian", "sources": [ { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.1 }, "cve": "CVE-2022-37325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-37325", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-37325", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2138", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "db": "NVD", "id": "CVE-2022-37325" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5358-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nFebruary 23, 2023 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325\n CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706\n\nMultiple security vulnerabilities have been discovered in Asterisk, an Open\nSource Private Branch Exchange. Buffer overflows and other programming errors\ncould be exploited for launching a denial of service attack or the execution of\narbitrary code. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u2. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n+NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2022-37325" }, { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37325", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2022.6287", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202212-2138", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "171105", "trust": 0.1 } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "db": "NVD", "id": "CVE-2022-37325" } ] }, "id": "VAR-202212-0160", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-08-14T13:06:23.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Asterisk Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=216716" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2138" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.debian.org/security/2023/dsa-5358" }, { "trust": 1.6, "url": "https://downloads.asterisk.org/pub/security/ast-2022-007.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-open-source-denial-of-service-via-h323-channel-add-on-40000" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6287" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37325/" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37325" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42705" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42706" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23537" } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "db": "NVD", "id": "CVE-2022-37325" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "db": "NVD", "id": "CVE-2022-37325" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-23T16:33:14", "db": "PACKETSTORM", "id": "171105" }, { "date": "2022-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "date": "2022-12-05T21:15:10.073000", "db": "NVD", "id": "CVE-2022-37325" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2138" }, { "date": "2023-02-24T00:15:11.757000", "db": "NVD", "id": "CVE-2022-37325" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2138" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2138" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2138" } ], "trust": 0.6 } }
var-201806-0745
Vulnerability from variot
An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable. Asterisk Open Source Contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. DigiumAsteriskOpenSource is an open source telephone exchange (PBX) system software from Digium, USA. The software supports voicemail, multi-party voice conferencing, interactive voice response (IVR) and more. A security vulnerability exists in the 15.x version prior to DigiumAsteriskOpenSource 15.4.1. Attackers can exploit this issue to crash the application, resulting in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201806-0745", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "15.4.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "15.0" }, { "model": "open source", "scope": "lt", "trust": 0.8, "vendor": "asterisk", "version": "15.x" }, { "model": "open source", "scope": "eq", "trust": 0.8, "vendor": "asterisk", "version": "15.4.1" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.6, "vendor": "digium", "version": "15.*\u003c15.4.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.2.2" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.2.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.2" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1.4" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1.3" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1.5" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "15.1.2" }, { "model": "open source", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "15.4.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "BID", "id": "104457" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:asterisk:open_source", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006656" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sean Bright", "sources": [ { "db": "BID", "id": "104457" } ], "trust": 0.3 }, "cve": "CVE-2018-12228", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2018-12228", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2018-12156", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2018-12228", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-12228", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-12228", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2018-12156", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201806-749", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNNVD", "id": "CNNVD-201806-749" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable. Asterisk Open Source Contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. DigiumAsteriskOpenSource is an open source telephone exchange (PBX) system software from Digium, USA. The software supports voicemail, multi-party voice conferencing, interactive voice response (IVR) and more. A security vulnerability exists in the 15.x version prior to DigiumAsteriskOpenSource 15.4.1. \nAttackers can exploit this issue to crash the application, resulting in a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2018-12228" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "BID", "id": "104457" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-12228", "trust": 3.3 }, { "db": "BID", "id": "104457", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-006656", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-12156", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201806-749", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "BID", "id": "104457" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNNVD", "id": "CNNVD-201806-749" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "id": "VAR-201806-0745", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" } ], "trust": 0.79659443 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" } ] }, "last_update_date": "2024-11-23T22:00:29.507000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2018-007", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html" }, { "title": "ASTERISK-27807", "trust": 0.8, "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807" }, { "title": "Patch for DigiumAsteriskOpenSource Remote Authentication Session Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/132899" }, { "title": "Digium Asterisk Open Source Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80913" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNNVD", "id": "CNNVD-201806-749" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-835", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://downloads.asterisk.org/pub/security/ast-2018-007.html" }, { "trust": 1.9, "url": "https://issues.asterisk.org/jira/browse/asterisk-27807" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/104457" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12228" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12228" }, { "trust": 0.3, "url": "http://www.asterisk.org/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "BID", "id": "104457" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNNVD", "id": "CNNVD-201806-749" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-12156" }, { "db": "BID", "id": "104457" }, { "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "db": "CNNVD", "id": "CNNVD-201806-749" }, { "db": "NVD", "id": "CVE-2018-12228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-12156" }, { "date": "2018-06-11T00:00:00", "db": "BID", "id": "104457" }, { "date": "2018-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "date": "2018-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-749" }, { "date": "2018-06-12T04:29:00.330000", "db": "NVD", "id": "CVE-2018-12228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-27T00:00:00", "db": "CNVD", "id": "CNVD-2018-12156" }, { "date": "2018-06-11T00:00:00", "db": "BID", "id": "104457" }, { "date": "2018-08-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-006656" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201806-749" }, { "date": "2024-11-21T03:44:49.210000", "db": "NVD", "id": "CVE-2018-12228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201806-749" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Open Source Authentication vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-006656" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201806-749" } ], "trust": 0.6 } }
var-201911-1169
Vulnerability from variot
An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands. Refer to the vendor information and take appropriate measures. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voice mail, multi-party voice conferencing, interactive voice response (IVR), and more.
Affected Versions
Product Release
Series
Asterisk Open Source 13.x All releases
Asterisk Open Source 16.x All releases
Asterisk Open Source 17.x All releases
Certified Asterisk 13.21 All releases
Corrected In
Product Release
Asterisk Open Source 13.29.2
Asterisk Open Source 16.6.2
Asterisk Open Source 17.0.1
Certified Asterisk 13.21-cert5
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2019-007-13.diff Asterisk 13
http://downloads.asterisk.org/pub/security/AST-2019-007-16.diff Asterisk 16
http://downloads.asterisk.org/pub/security/AST-2019-007-17.diff Asterisk 17
http://downloads.asterisk.org/pub/security/AST-2019-007-13.21.diff Certified
Asterisk
13.21-cert5
Links https://issues.asterisk.org/jira/browse/ASTERISK-28580
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2019-007.pdf and
http://downloads.digium.com/pub/security/AST-2019-007.html
Revision History
Date Editor Revisions Made
October 24, 2019 George Joseph Initial Revision
November 21, 2019 Ben Ford Added “Posted On” date
Asterisk Project Security Advisory - AST-2019-007
Copyright © 2019 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "13.29.2" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "digium", "version": "13.21.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "16.6.2" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "17.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "13.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "digium", "version": "17.0.1" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "asterisk", "scope": "lte", "trust": 0.8, "vendor": "digium", "version": "13.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "16.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "17.x" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "13.21 to 13.21-cert4" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=13.*" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=16.*" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=17.*" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.6, "vendor": "sangoma", "version": "13.21" }, { "model": "certified asterisk 13.21-cert4", "scope": null, "trust": 0.6, "vendor": "sangoma", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:asterisk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012584" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "gjoseph", "sources": [ { "db": "PACKETSTORM", "id": "155435" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" } ], "trust": 0.7 }, "cve": "CVE-2019-18610", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2019-18610", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2020-03060", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-18610", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18610", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-18610", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-18610", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-03060", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-1290", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands. Refer to the vendor information and take appropriate measures. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voice mail, multi-party voice conferencing, interactive voice response (IVR), and more. \n\n Affected Versions \n Product Release \n Series \n Asterisk Open Source 13.x All releases \n Asterisk Open Source 16.x All releases \n Asterisk Open Source 17.x All releases \n Certified Asterisk 13.21 All releases \n\n Corrected In \n Product Release \n Asterisk Open Source 13.29.2 \n Asterisk Open Source 16.6.2 \n Asterisk Open Source 17.0.1 \n Certified Asterisk 13.21-cert5 \n\n Patches \n SVN URL Revision \n http://downloads.asterisk.org/pub/security/AST-2019-007-13.diff Asterisk 13 \n http://downloads.asterisk.org/pub/security/AST-2019-007-16.diff Asterisk 16 \n http://downloads.asterisk.org/pub/security/AST-2019-007-17.diff Asterisk 17 \n http://downloads.asterisk.org/pub/security/AST-2019-007-13.21.diff Certified \n Asterisk \n 13.21-cert5 \n\n Links https://issues.asterisk.org/jira/browse/ASTERISK-28580 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n http://downloads.digium.com/pub/security/AST-2019-007.pdf and \n http://downloads.digium.com/pub/security/AST-2019-007.html \n\n Revision History\n Date Editor Revisions Made \n October 24, 2019 George Joseph Initial Revision \n November 21, 2019 Ben Ford Added \u201cPosted On\u201d date \n\n Asterisk Project Security Advisory - AST-2019-007\n Copyright \u00a9 2019 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form", "sources": [ { "db": "NVD", "id": "CVE-2019-18610" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "PACKETSTORM", "id": "155435" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18610", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-012584", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "155435", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-03060", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4526", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4421", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-1290", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "PACKETSTORM", "id": "155435" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "id": "VAR-201911-1169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" } ], "trust": 0.948297215 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" } ] }, "last_update_date": "2024-11-23T21:52:07.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisories", "trust": 0.8, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "title": "AST-2019-007", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2019-007.html" }, { "title": "[SECURITY] [DLA 2017-1] asterisk security update", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "title": "Patch for Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Command Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/196957" }, { "title": "Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104055" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007.html" }, { "trust": 1.6, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18610" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18610" }, { "trust": 0.6, "url": "https://seclists.org/fulldisclosure/2019/nov/19" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-008.html" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006.html" }, { "trust": 0.6, "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html second message url unavailable at time of publishing" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-privilege-escalation-via-ami-originate-request-30936" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4526/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155435/asterisk-project-security-advisory-ast-2019-007.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4421/" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2019-007.pdf" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2019-007.html" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007-13.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007-17.diff" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-28580" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007-16.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007-13.21.diff" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "PACKETSTORM", "id": "155435" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-03060" }, { "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "db": "PACKETSTORM", "id": "155435" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "db": "NVD", "id": "CVE-2019-18610" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-03060" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "date": "2019-11-21T23:30:33", "db": "PACKETSTORM", "id": "155435" }, { "date": "2019-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "date": "2019-11-22T18:15:11.030000", "db": "NVD", "id": "CVE-2019-18610" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-21T00:00:00", "db": "CNVD", "id": "CNVD-2020-03060" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012584" }, { "date": "2022-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1290" }, { "date": "2024-11-21T04:33:21.593000", "db": "NVD", "id": "CVE-2019-18610" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "155435" }, { "db": "CNNVD", "id": "CNNVD-201911-1290" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sangoma Asterisk and Certified Asterisk Vulnerabilities related to lack of authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1290" } ], "trust": 0.6 } }
var-202410-1759
Vulnerability from variot
An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed. Sangoma of Asterisk and certified asterisk Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202410-1759", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "18.20.0" }, { "model": "certified asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.9" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "18.9" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "20.5.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "21.0.0" }, { "model": "asterisk", "scope": null, "trust": 0.8, "vendor": "sangoma", "version": null }, { "model": "certified asterisk", "scope": null, "trust": 0.8, "vendor": "sangoma", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "cve": "CVE-2024-49215", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2024-49215", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-49215", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-49215", "trust": 1.0, "value": "HIGH" }, { "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "id": "CVE-2024-49215", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2024-49215", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and 20.x through 20.5.0, and 21.x through 21.0.0, and Certified Asterisk through 18.9-cert5. In manager.c, the functions action_getconfig() and action_getconfigJson() do not process the input file path, resulting in a path traversal vulnerability. In versions without the restrictedFile() function, no processing is done on the input path. In versions with the restrictedFile() function, path traversal is not processed. Sangoma of Asterisk and certified asterisk Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2024-49215" }, { "db": "JVNDB", "id": "JVNDB-2024-011079" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-49215", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2024-011079", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "id": "VAR-202410-1759", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-10-26T23:27:44.782000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Path traversal (CWE-22) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://gist.github.com/hyp164d1/5d68b9b7a504f1416272a825ce65966a" }, { "trust": 1.8, "url": "https://github.com/asterisk/asterisk/blob/20.5.0/main/manager.c#l3755" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-49215" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "db": "NVD", "id": "CVE-2024-49215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "date": "2024-10-21T01:15:02.943000", "db": "NVD", "id": "CVE-2024-49215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-10-25T01:12:00", "db": "JVNDB", "id": "JVNDB-2024-011079" }, { "date": "2024-10-24T14:10:17.137000", "db": "NVD", "id": "CVE-2024-49215" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sangoma\u00a0 of \u00a0Asterisk\u00a0 and \u00a0certified\u00a0asterisk\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-011079" } ], "trust": 0.8 } }
var-200909-0357
Vulnerability from variot
The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263. The problem is CVE-2008-3263 Related toBy a third party IAX2 Service operation disruption by starting message exchange ( Call number exhaustion ) There is a possibility of being put into a state. Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. Successful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users.
The vulnerabilities are caused due to NULL-pointer dereference errors in the "sip_uri_params_cmp()" and "sip_uri_headers_cmp()" functions. This can be exploited to crash the application via a SIP message lacking certain headers.
Successful exploitation requires that the SIP channel driver is configured with the "pedantic" option enabled.
PROVIDED AND/OR DISCOVERED BY: The vendor credits bugs.digium.com user klaus3000. Asterisk Project Security Advisory - AST-2009-006
+------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | IAX2 Call Number Resource Exhaustion | |--------------------+---------------------------------------------------| | Nature of Advisory | Denial of Service | |--------------------+---------------------------------------------------| | Susceptibility | Remote unauthenticated sessions | |--------------------+---------------------------------------------------| | Severity | Major | |--------------------+---------------------------------------------------| | Exploits Known | Yes - Published by Blake Cornell < blake AT | | | remoteorigin DOT com > on voip0day.com | |--------------------+---------------------------------------------------| | Reported On | June 22, 2008 | |--------------------+---------------------------------------------------| | Reported By | Noam Rathaus < noamr AT beyondsecurity DOT com >, | | | with his SSD program, also by Blake Cornell | |--------------------+---------------------------------------------------| | Posted On | September 3, 2009 | |--------------------+---------------------------------------------------| | Last Updated On | September 3, 2009 | |--------------------+---------------------------------------------------| | Advisory Contact | Russell Bryant < russell AT digium DOT com > | |--------------------+---------------------------------------------------| | CVE Name | CVE-2009-2346 | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Description | The IAX2 protocol uses a call number to associate | | | messages with the call that they belong to. However, the | | | protocol defines the call number field in messages as a | | | fixed size 15 bit field. So, if all call numbers are in | | | use, no additional sessions can be handled. | | | | | | A call number gets created at the start of an IAX2 | | | message exchange. So, an attacker can send a large | | | number of messages and consume the call number space. | | | The attack is also possible using spoofed source IP | | | addresses as no handshake is required before a call | | | number is assigned. | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Resolution | Upgrade to a version of Asterisk listed in this document | | | as containing the IAX2 protocol security enhancements. In | | | addition to upgrading, administrators should consult the | | | users guide section of the IAX2 Security document | | | (IAX2-security.pdf), as well as the sample configuration | | | file for chan_iax2 that have been distributed with those | | | releases for assistance with new options that have been | | | provided. | +------------------------------------------------------------------------+
+------------------------------------------------------------------------+ | Discussion | A lot of time was spent trying to come up with a way to | | | resolve this issue in a way that was completely backwards | | | compatible. However, the final resolution ended up | | | requiring a modification to the IAX2 protocol. This | | | modification is referred to as call token validation. | | | Call token validation is used as a handshake before call | | | numbers are assigned to IAX2 connections. | | | | | | Call token validation by itself does not resolve the | | | issue. However, it does allow an IAX2 server to validate | | | that the source of the messages has not been spoofed. In | | | addition to call token validation, Asterisk now also has | | | the ability to limit the amount of call numbers assigned | | | to a given remote IP address. | | | | | | The combination of call token validation and call number | | | allocation limits is used to mitigate this denial of | | | service issue. | | | | | | An alternative approach to securing IAX2 would be to use | | | a security layer on top of IAX2, such as DTLS [RFC4347] | | | or IPsec [RFC4301]. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201006-20
http://security.gentoo.org/
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: June 04, 2010 Bugs: #281107, #283624, #284892, #295270 ID: 201006-20
Synopsis
Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 1.2.37 >= 1.2.37
Description
Multiple vulnerabilities have been reported in Asterisk:
-
Nick Baggott reported that Asterisk does not properly process overly long ASCII strings in various packets (CVE-2009-2726).
-
Noam Rathaus and Blake Cornell reported a flaw in the IAX2 protocol implementation (CVE-2009-2346).
-
amorsen reported an input processing error in the RTP protocol implementation (CVE-2009-4055).
-
Patrik Karlsson reported an information disclosure flaw related to the REGISTER message (CVE-2009-3727).
-
A vulnerability was found in the bundled Prototype JavaScript library, related to AJAX calls (CVE-2008-7220).
Impact
A remote attacker could exploit these vulnerabilities by sending a specially crafted package, possibly causing a Denial of Service condition, or resulting in information disclosure.
Workaround
There is no known workaround at this time.
Resolution
All Asterisk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.37"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since January 5, 2010. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2009-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726 [ 2 ] CVE-2009-2346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346 [ 3 ] CVE-2009-4055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055 [ 4 ] CVE-2009-3727 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727 [ 5 ] CVE-2008-7220 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201006-20.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Asterisk IAX2 Call Number Exhaustion Denial of Service
SECUNIA ADVISORY ID: SA36593
VERIFY ADVISORY: http://secunia.com/advisories/36593/
DESCRIPTION: A vulnerability has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).
S800i (Asterisk Appliance): Update to version 1.3.0.3.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: * Noam Rathaus * Blake Cornell
ORIGINAL ADVISORY: http://downloads.asterisk.org/pub/security/AST-2009-006.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
The vulnerabilities are caused due to "sscanf()" being invoked without specifying a maximum width e.g. when processing SIP messages. This can be exploited to exhaust stack memory in the SIP stack network thread via overly long numeric strings in various fields of a message.
NOTE: According to the vendor this is only potentially exploitable in 1.6.1 and above
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200909-0357", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.34" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.24.1" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.26" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.24" }, { "model": "appliance s800i", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.3.0.2" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.32" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.33" }, { "model": "appliance s800i", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.3" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.2.31" }, { "model": "opensource", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.4.23.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.22" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.9" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.10" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.23" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.21.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.12.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.23" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.9" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.0_beta7" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.2.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.14" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.13" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4beta" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.9" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.17" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.1.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.3.1.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.8" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.14" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "1.6.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.6" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.21" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.10.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.7" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.19" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.0.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.4.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.17" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.7" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.27" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.18" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.13" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.1.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.1.3.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.21.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.16" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.8.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.11" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.8" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.18" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.19.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.0_beta8" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.4" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.9.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.15" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.2.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.20" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.11" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.5.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.6.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.8" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.28" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.6.1.5" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.1.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.30.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.6" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.12.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.25" }, { "model": "opensource", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.26.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.10" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.15" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.26" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.16.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.18.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "b.2.3.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.1.10.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.22" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.4.20" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.24" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.2.29" }, { "model": "appliance s800i", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.3.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "business edition of b.2.5.10" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "b.x.x" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.4.x" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.6.0.x" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.6.0.15" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.2.x" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "c.2.4.3" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.4.26.2" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.2.35" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "c.2.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "c.3.1.1" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.6.1.x" }, { "model": "appliance s800i", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.3.0.3" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.6.1.6" }, { "model": "asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "c.3.x" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "s800i appliance", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.3.2" }, { "model": "s800i appliance", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.3" }, { "model": "business edition c.3.1.0", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.4.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.3", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": ".2" }, { "model": "business edition c.2.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.2.1.2.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.8.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.10.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.0-beta8", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.1.0-beta7", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.9", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.8", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.6", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.3.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.2.1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.2.0", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.1.3.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.1.3.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "0-rc2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "0-rc1", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1.5" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1" }, { "model": "beta6", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.66" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.24.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.23" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.22" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19.1" }, { "model": "-rc3", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.18" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.17" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.16" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.15" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.13" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.12" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.11" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.10" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.9" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.7" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.5" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.34" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.33" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.32" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.31" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.29" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.28" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.27" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.26" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.25" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.23" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.22" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.21" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.19" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.18" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.17" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.16" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.15" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.13" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.11" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.10" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.9" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.7" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.5" }, { "model": ".0-beta2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2" }, { "model": ".0-beta1", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.14" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.22.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.21.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4.18.1" }, { "model": "revision", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.495946" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.2.30.3" }, { "model": "s800i appliance", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.3.0.3" }, { "model": "business edition c.3.1", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1" }, { "model": "business edition c.2.4.3", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition b.2.5.10", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1.6" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.2.35" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.6.0.15" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.4.26.2" } ], "sources": [ { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:digium:appliance_s800i", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:asterisk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Russell Bryant russell@digium.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.6 }, "cve": "CVE-2009-2346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2009-2346", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-2346", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2009-2346", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200909-091", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2009-2346", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before B.2.5.10, C.2.x before C.2.4.3, and C.3.x before C.3.1.1; and s800i 1.3.x before 1.3.0.3 allows remote attackers to cause a denial of service (call-number exhaustion) by initiating many IAX2 message exchanges, a related issue to CVE-2008-3263. The problem is CVE-2008-3263 Related toBy a third party IAX2 Service operation disruption by starting message exchange ( Call number exhaustion ) There is a possibility of being put into a state. Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. \nSuccessful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users. \n\nThe vulnerabilities are caused due to NULL-pointer dereference errors\nin the \"sip_uri_params_cmp()\" and \"sip_uri_headers_cmp()\" functions. \nThis can be exploited to crash the application via a SIP message\nlacking certain headers. \n\nSuccessful exploitation requires that the SIP channel driver is\nconfigured with the \"pedantic\" option enabled. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits bugs.digium.com user klaus3000. Asterisk Project Security Advisory - AST-2009-006\n\n +------------------------------------------------------------------------+\n | Product | Asterisk |\n |--------------------+---------------------------------------------------|\n | Summary | IAX2 Call Number Resource Exhaustion |\n |--------------------+---------------------------------------------------|\n | Nature of Advisory | Denial of Service |\n |--------------------+---------------------------------------------------|\n | Susceptibility | Remote unauthenticated sessions |\n |--------------------+---------------------------------------------------|\n | Severity | Major |\n |--------------------+---------------------------------------------------|\n | Exploits Known | Yes - Published by Blake Cornell \u003c blake AT |\n | | remoteorigin DOT com \u003e on voip0day.com |\n |--------------------+---------------------------------------------------|\n | Reported On | June 22, 2008 |\n |--------------------+---------------------------------------------------|\n | Reported By | Noam Rathaus \u003c noamr AT beyondsecurity DOT com \u003e, |\n | | with his SSD program, also by Blake Cornell |\n |--------------------+---------------------------------------------------|\n | Posted On | September 3, 2009 |\n |--------------------+---------------------------------------------------|\n | Last Updated On | September 3, 2009 |\n |--------------------+---------------------------------------------------|\n | Advisory Contact | Russell Bryant \u003c russell AT digium DOT com \u003e |\n |--------------------+---------------------------------------------------|\n | CVE Name | CVE-2009-2346 |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Description | The IAX2 protocol uses a call number to associate |\n | | messages with the call that they belong to. However, the |\n | | protocol defines the call number field in messages as a |\n | | fixed size 15 bit field. So, if all call numbers are in |\n | | use, no additional sessions can be handled. |\n | | |\n | | A call number gets created at the start of an IAX2 |\n | | message exchange. So, an attacker can send a large |\n | | number of messages and consume the call number space. |\n | | The attack is also possible using spoofed source IP |\n | | addresses as no handshake is required before a call |\n | | number is assigned. |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Resolution | Upgrade to a version of Asterisk listed in this document |\n | | as containing the IAX2 protocol security enhancements. In |\n | | addition to upgrading, administrators should consult the |\n | | users guide section of the IAX2 Security document |\n | | (IAX2-security.pdf), as well as the sample configuration |\n | | file for chan_iax2 that have been distributed with those |\n | | releases for assistance with new options that have been |\n | | provided. |\n +------------------------------------------------------------------------+\n\n +------------------------------------------------------------------------+\n | Discussion | A lot of time was spent trying to come up with a way to |\n | | resolve this issue in a way that was completely backwards |\n | | compatible. However, the final resolution ended up |\n | | requiring a modification to the IAX2 protocol. This |\n | | modification is referred to as call token validation. |\n | | Call token validation is used as a handshake before call |\n | | numbers are assigned to IAX2 connections. |\n | | |\n | | Call token validation by itself does not resolve the |\n | | issue. However, it does allow an IAX2 server to validate |\n | | that the source of the messages has not been spoofed. In |\n | | addition to call token validation, Asterisk now also has |\n | | the ability to limit the amount of call numbers assigned |\n | | to a given remote IP address. |\n | | |\n | | The combination of call token validation and call number |\n | | allocation limits is used to mitigate this denial of |\n | | service issue. |\n | | |\n | | An alternative approach to securing IAX2 would be to use |\n | | a security layer on top of IAX2, such as DTLS [RFC4347] |\n | | or IPsec [RFC4301]. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201006-20\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Asterisk: Multiple vulnerabilities\n Date: June 04, 2010\n Bugs: #281107, #283624, #284892, #295270\n ID: 201006-20\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Asterisk might allow remote attackers to\ncause a Denial of Service condition, or conduct other attacks. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/asterisk \u003c 1.2.37 \u003e= 1.2.37\n\nDescription\n===========\n\nMultiple vulnerabilities have been reported in Asterisk:\n\n* Nick Baggott reported that Asterisk does not properly process\n overly long ASCII strings in various packets (CVE-2009-2726). \n\n* Noam Rathaus and Blake Cornell reported a flaw in the IAX2 protocol\n implementation (CVE-2009-2346). \n\n* amorsen reported an input processing error in the RTP protocol\n implementation (CVE-2009-4055). \n\n* Patrik Karlsson reported an information disclosure flaw related to\n the REGISTER message (CVE-2009-3727). \n\n* A vulnerability was found in the bundled Prototype JavaScript\n library, related to AJAX calls (CVE-2008-7220). \n\nImpact\n======\n\nA remote attacker could exploit these vulnerabilities by sending a\nspecially crafted package, possibly causing a Denial of Service\ncondition, or resulting in information disclosure. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/asterisk-1.2.37\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since January 5, 2010. It is likely that your system is\nalready no longer affected by this issue. \n\nReferences\n==========\n\n [ 1 ] CVE-2009-2726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726\n [ 2 ] CVE-2009-2346\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346\n [ 3 ] CVE-2009-4055\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055\n [ 4 ] CVE-2009-3727\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727\n [ 5 ] CVE-2008-7220\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201006-20.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2010 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nAsterisk IAX2 Call Number Exhaustion Denial of Service\n\nSECUNIA ADVISORY ID:\nSA36593\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36593/\n\nDESCRIPTION:\nA vulnerability has been reported in Asterisk, which can be exploited\nby malicious people to cause a DoS (Denial of Service). \n\nS800i (Asterisk Appliance):\nUpdate to version 1.3.0.3. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n* Noam Rathaus\n* Blake Cornell\n\nORIGINAL ADVISORY:\nhttp://downloads.asterisk.org/pub/security/AST-2009-006.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nThe vulnerabilities are caused due to \"sscanf()\" being invoked\nwithout specifying a maximum width e.g. when processing SIP messages. \nThis can be exploited to exhaust stack memory in the SIP stack network\nthread via overly long numeric strings in various fields of a\nmessage. \n\nNOTE: According to the vendor this is only potentially exploitable in\n1.6.1 and above", "sources": [ { "db": "NVD", "id": "CVE-2009-2346" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "BID", "id": "36275" }, { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-2346", "trust": 3.0 }, { "db": "BID", "id": "36275", "trust": 2.0 }, { "db": "SECUNIA", "id": "36593", "trust": 1.8 }, { "db": "SECTRACK", "id": "1022819", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2009-003591", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20090903 AST-2009-006: IAX2 CALL NUMBER RESOURCE EXHAUSTION", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200909-091", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2009-2346", "trust": 0.1 }, { "db": "SECUNIA", "id": "34229", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75661", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80978", "trust": 0.1 }, { "db": "SECUNIA", "id": "36889", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81677", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90288", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81003", "trust": 0.1 }, { "db": "SECUNIA", "id": "36227", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80408", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "id": "VAR-200909-0357", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.19659443 }, "last_update_date": "2024-11-23T21:05:16.396000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2009-006", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2009-006.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/36275" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36593" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1022819" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/506257/100/0/threaded" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2346" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2346" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/506257/100/0/threaded" }, { "trust": 0.4, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.4, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.4, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "/archive/1/506257" }, { "trust": 0.2, "url": "http://secunia.com/advisories/34229/" }, { "trust": 0.2, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.2.diff.txt" }, { "trust": 0.2, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.4.diff.txt" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2346" }, { "trust": 0.2, "url": "http://secunia.com/advisories/36227/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/36593/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-002.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.1, "url": "https://issues.asterisk.org/view.php?id=12912" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-006.html" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt|1.6.0" }, { "trust": 0.1, "url": "http://www.beyondsecurity.com/ssd.html" }, { "trust": 0.1, "url": "http://www.rfc-editor.org/authors/rfc5456.txt" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt|1.6.1" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-006.pdf" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/36889/" }, { "trust": 0.1, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-september/msg00783.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3727" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201006-20.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4055" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-7220" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2726" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2726" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.0.diff.txt" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-006-1.6.1.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.4.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.0.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.2.diff.txt" }, { "trust": 0.1, "url": "http://labs.mudynamics.com/advisories/mu-200908-01.txt" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2009-005.html" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.6.1.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-1.2.diff.txt" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2009-005-trunk.diff.txt" } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2009-2346" }, { "db": "BID", "id": "36275" }, { "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "db": "PACKETSTORM", "id": "75661" }, { "db": "PACKETSTORM", "id": "80978" }, { "db": "PACKETSTORM", "id": "81677" }, { "db": "PACKETSTORM", "id": "90288" }, { "db": "PACKETSTORM", "id": "81003" }, { "db": "PACKETSTORM", "id": "80408" }, { "db": "CNNVD", "id": "CNNVD-200909-091" }, { "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-09-08T00:00:00", "db": "VULMON", "id": "CVE-2009-2346" }, { "date": "2009-09-03T00:00:00", "db": "BID", "id": "36275" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "date": "2009-03-11T08:30:33", "db": "PACKETSTORM", "id": "75661" }, { "date": "2009-09-04T01:28:46", "db": "PACKETSTORM", "id": "80978" }, { "date": "2009-09-28T05:54:05", "db": "PACKETSTORM", "id": "81677" }, { "date": "2010-06-04T05:34:39", "db": "PACKETSTORM", "id": "90288" }, { "date": "2009-09-04T15:24:50", "db": "PACKETSTORM", "id": "81003" }, { "date": "2009-08-17T09:58:53", "db": "PACKETSTORM", "id": "80408" }, { "date": "2009-09-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-091" }, { "date": "2009-09-08T18:30:00.203000", "db": "NVD", "id": "CVE-2009-2346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULMON", "id": "CVE-2009-2346" }, { "date": "2015-04-13T22:21:00", "db": "BID", "id": "36275" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-003591" }, { "date": "2009-09-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200909-091" }, { "date": "2024-11-21T01:04:39.463000", "db": "NVD", "id": "CVE-2009-2346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "90288" }, { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Open Source of IAX2 Service disruption in protocol implementation (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-003591" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200909-091" } ], "trust": 0.6 } }
var-201706-0901
Vulnerability from variot
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop). Asterisk Open Source and Certified Asterisk Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Asterisk products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0901", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "certified asterisk", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "13.13.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.1.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.14.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.3.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.8.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.4.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.10.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.8.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.6.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.11.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.1.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.12.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.15.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.0.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.5.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.12.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.13.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.7.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.8.1" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.12.2" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.4.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "14.3.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.9.0" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "13.0.0" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "14.x" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "13.13-cert4" }, { "model": "certified asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "13.13" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "13.15.1" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "14.4.1" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "13.x" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "14.1.0" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "14.2.0" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "14.4.0" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "14.3.0" }, { "model": "open source", "scope": "eq", "trust": 0.6, "vendor": "asterisk", "version": "14.0.0" }, { "model": "certified asterisk 13.13-cert3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "certified asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.13" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.7.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.3.2" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.0.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "14.0" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.8.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.1.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.0.2" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "13.0" }, { "model": "certified asterisk 13.13-cert4", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "open source", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "14.4.1" }, { "model": "open source", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "13.15.1" } ], "sources": [ { "db": "BID", "id": "98573" }, { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004594" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sandro Gauci", "sources": [ { "db": "BID", "id": "98573" } ], "trust": 0.3 }, "cve": "CVE-2017-9358", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2017-9358", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2017-9358", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-9358", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-9358", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201706-060", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop). Asterisk Open Source and Certified Asterisk Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Asterisk products are prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2017-9358" }, { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "BID", "id": "98573" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-9358", "trust": 2.7 }, { "db": "BID", "id": "98573", "trust": 1.9 }, { "db": "SECTRACK", "id": "1038531", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2017-004594", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201706-060", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "98573" }, { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "id": "VAR-201706-0901", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T22:45:38.645000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2017-004", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2017-004.txt" }, { "title": "863906", "trust": 0.8, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863906" }, { "title": "Digium Asterisk Open Source and Certified Asterisk Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70679" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-835", "trust": 1.0 }, { "problemtype": "CWE-400", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://downloads.asterisk.org/pub/security/ast-2017-004.txt" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/98573" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1038531" }, { "trust": 1.6, "url": "https://bugs.debian.org/863906" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9358" }, { "trust": 0.3, "url": "http://seclists.org/fulldisclosure/2017/may/76" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "http://downloads.asterisk.org/pub/security/ast-2017-004.html" } ], "sources": [ { "db": "BID", "id": "98573" }, { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "98573" }, { "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "db": "CNNVD", "id": "CNNVD-201706-060" }, { "db": "NVD", "id": "CVE-2017-9358" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-13T00:00:00", "db": "BID", "id": "98573" }, { "date": "2017-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "date": "2017-06-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-060" }, { "date": "2017-06-02T05:29:00.700000", "db": "NVD", "id": "CVE-2017-9358" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-02T18:01:00", "db": "BID", "id": "98573" }, { "date": "2017-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004594" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201706-060" }, { "date": "2024-11-21T03:35:54.630000", "db": "NVD", "id": "CVE-2017-9358" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Open Source and Certified Asterisk Vulnerable to resource exhaustion", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004594" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201706-060" } ], "trust": 0.6 } }
var-202202-0167
Vulnerability from variot
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue. Teluu Ltd. of PJSIP Products from multiple other vendors contain vulnerabilities related to use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-005
Product Asterisk
Summary pjproject: undefined behavior after freeing a dialog
set
Nature of Advisory Denial of service
Susceptibility Remote unauthenticated sessions
Severity Major
Exploits Known Yes
Reported On March 3, 2022
Reported By Sauw Ming
Posted On March 4, 2022
Last Updated On March 3, 2022
Advisory Contact kharwell AT sangoma DOT com
CVE Name CVE-2022-23608
Description When acting as a UAC, and when placing an outgoing
call to a target that then forks Asterisk may
experience undefined behavior (crashes, hangs, etc…)
after a dialog set is prematurely freed.
Modules Affected bundled pjproject
Resolution If you use “with-pjproject-bundled” then upgrade to, or
install one of, the versions of Asterisk listed below.
Otherwise install the appropriate version of pjproject that
contains the patch.
Affected Versions
Product Release Series
Asterisk Open Source 16.x All versions
Asterisk Open Source 18.x All versions
Asterisk Open Source 19.x All versions
Certified Asterisk 16.x All versions
Corrected In
Product Release
Asterisk Open Source 16.24.1,18.10.1,19.2.1
Certified Asterisk 16.8-cert13
Patches
Patch URL Revision
https://downloads.digium.com/pub/security/AST-2022-005-16.diff Asterisk
16
https://downloads.digium.com/pub/security/AST-2022-005-18.diff Asterisk
18
https://downloads.digium.com/pub/security/AST-2022-005-19.diff Asterisk
19
https://downloads.digium.com/pub/security/AST-2022-005-16.8.diff Certified
Asterisk
16.8
Links https://issues.asterisk.org/jira/browse/ASTERISK-29945
https://downloads.asterisk.org/pub/security/AST-2022-005.html
https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
https://downloads.digium.com/pub/security/AST-2022-005.pdf and
https://downloads.digium.com/pub/security/AST-2022-005.html
Revision History
Date Editor Revisions Made
March 3, 2022 Kevin Harwell Initial revision
Asterisk Project Security Advisory - AST-2022-005
Copyright © 2022 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-37
https://security.gentoo.org/
Severity: Normal Title: PJSIP: Multiple Vulnerabilities Date: October 31, 2022 Bugs: #803614, #829894, #875863 ID: 202210-37
Synopsis
Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/pjproject < 2.12.1 >= 2.12.1
Description
Multiple vulnerabilities have been discovered in PJSIP. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Resolution
All PJSIP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.12.1"
References
[ 1 ] CVE-2021-32686 https://nvd.nist.gov/vuln/detail/CVE-2021-32686 [ 2 ] CVE-2021-37706 https://nvd.nist.gov/vuln/detail/CVE-2021-37706 [ 3 ] CVE-2021-41141 https://nvd.nist.gov/vuln/detail/CVE-2021-41141 [ 4 ] CVE-2021-43804 https://nvd.nist.gov/vuln/detail/CVE-2021-43804 [ 5 ] CVE-2021-43845 https://nvd.nist.gov/vuln/detail/CVE-2021-43845 [ 6 ] CVE-2022-21722 https://nvd.nist.gov/vuln/detail/CVE-2022-21722 [ 7 ] CVE-2022-21723 https://nvd.nist.gov/vuln/detail/CVE-2022-21723 [ 8 ] CVE-2022-23608 https://nvd.nist.gov/vuln/detail/CVE-2022-23608 [ 9 ] CVE-2022-24754 https://nvd.nist.gov/vuln/detail/CVE-2022-24754 [ 10 ] CVE-2022-24763 https://nvd.nist.gov/vuln/detail/CVE-2022-24763 [ 11 ] CVE-2022-24764 https://nvd.nist.gov/vuln/detail/CVE-2022-24764 [ 12 ] CVE-2022-24786 https://nvd.nist.gov/vuln/detail/CVE-2022-24786 [ 13 ] CVE-2022-24792 https://nvd.nist.gov/vuln/detail/CVE-2022-24792 [ 14 ] CVE-2022-24793 https://nvd.nist.gov/vuln/detail/CVE-2022-24793 [ 15 ] CVE-2022-31031 https://nvd.nist.gov/vuln/detail/CVE-2022-31031 [ 16 ] CVE-2022-39244 https://nvd.nist.gov/vuln/detail/CVE-2022-39244 [ 17 ] CVE-2022-39269 https://nvd.nist.gov/vuln/detail/CVE-2022-39269
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-37
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5285-1 security@debian.org https://www.debian.org/security/ Markus Koschany November 17, 2022 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608 CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792 CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651 Debian Bug : 1014998 1018073 1014976
Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code.
Special care should be taken when upgrading to this new upstream release. Some configuration files and options have changed in order to remedy certain security vulnerabilities. Most notably the pjsip TLS listener only accepts TLSv1.3 connections in the default configuration now. This can be reverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also https://issues.asterisk.org/jira/browse/ASTERISK-29017.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u1.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmN2qoFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeR0pQ/+Kr+FWFeFyrkFTyVv5BGBJug+EvZzzC2JZoI/TNsiAWQi/BZTQJ0pmdZr EHokqN7Z35EqZW6sj5aypdK7bOv4N+uv6P59xROk1KjEEG6XttGJ2BUvffWYWEXo k6+ou/yfAxU72Ufd1eOcMtjyGeN0CljmemIJ5Cywpnaw8YArP+VzRK2NEth0gCmJ TAfSvIPFaS7jB6fEg8KESOpmvtlqEJUh5sjP2t+OOEc3AoNBBuj4ZC44SQ1nif6k jEbmLFnJYQF8dP+IasZ3SY80N+BeuGiylZQ6w1ZvuYuUAK3jhHQ3CJvTQ4sEqNQV Zva6t0kHOEKVxKg412oEpQ0ihR+EBF/lnECu7iR2HTKk8xteNwio5qeeW/joTAJx OTYlHTtERTZIiaHdmV3nmGYgrTLeDHClilCnJrQuyXF+LVHjxBWDh7WS83zSrdIH gNP0eZ5UEjrpomf1yKqHVUsji63eSWACdFVXJLACMwpuevq8qgV6zASD+VuUd36r foEOKVj+FIHehWSef9pP48Na8bOn0EDVqtZEPOjE6o8Y8PjgSf7BSNogppZncldw VREox9NsxGM9hSVh3lVBWL8lT76HQVzXjfXXXoIEFDiGokNRV/dNTuhhb/mh0zxr VTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\xeajm -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6422-1 October 09, 2023
ring vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Ring.
Software Description: - ring: Secure and distributed voice, video, and chat platform
Details:
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-37706)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031, CVE-2022-39244)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04: jami 20230206.0~ds1-5ubuntu0.1 jami-daemon 20230206.0~ds1-5ubuntu0.1
Ubuntu 20.04 LTS: jami 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 jami-daemon 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 ring 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 ring-daemon 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro): ring 20180228.1.503da2b~ds1-1ubuntu0.1~esm1 ring-daemon 20180228.1.503da2b~ds1-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6422-1 CVE-2021-37706, CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21722, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031, CVE-2022-39244, CVE-2023-27585
Package Information: https://launchpad.net/ubuntu/+source/ring/20230206.0~ds1-5ubuntu0.1
https://launchpad.net/ubuntu/+source/ring/20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0167", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "certified asterisk", "scope": "lt", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.24.1" }, { "model": "pjsip", "scope": "lte", "trust": 1.0, "vendor": "teluu", "version": "2.11.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.2.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.10.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "pjsip", "scope": null, "trust": 0.8, "vendor": "teluu", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "certified asterisk", "scope": null, "trust": 0.8, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": null, "trust": 0.8, "vendor": "sangoma", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kevin Harwell, Sauw Ming", "sources": [ { "db": "PACKETSTORM", "id": "166226" } ], "trust": 0.1 }, "cve": "CVE-2022-23608", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-23608", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-23608", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "security-advisories@github.com", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2022-23608", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-23608", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-23608", "trust": 1.0, "value": "CRITICAL" }, { "author": "security-advisories@github.com", "id": "CVE-2022-23608", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-23608", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202202-1757", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2022-23608", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "db": "NVD", "id": "CVE-2022-23608" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue. Teluu Ltd. of PJSIP Products from multiple other vendors contain vulnerabilities related to use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-005\n\n Product Asterisk \n Summary pjproject: undefined behavior after freeing a dialog \n set \n Nature of Advisory Denial of service \n Susceptibility Remote unauthenticated sessions \n Severity Major \n Exploits Known Yes \n Reported On March 3, 2022 \n Reported By Sauw Ming \n Posted On March 4, 2022 \n Last Updated On March 3, 2022 \n Advisory Contact kharwell AT sangoma DOT com \n CVE Name CVE-2022-23608 \n\n Description When acting as a UAC, and when placing an outgoing \n call to a target that then forks Asterisk may \n experience undefined behavior (crashes, hangs, etc\u2026) \n after a dialog set is prematurely freed. \n Modules Affected bundled pjproject \n\n Resolution If you use \u201cwith-pjproject-bundled\u201d then upgrade to, or \n install one of, the versions of Asterisk listed below. \n Otherwise install the appropriate version of pjproject that \n contains the patch. \n\n Affected Versions\n Product Release Series \n Asterisk Open Source 16.x All versions \n Asterisk Open Source 18.x All versions \n Asterisk Open Source 19.x All versions \n Certified Asterisk 16.x All versions \n\n Corrected In\n Product Release \n Asterisk Open Source 16.24.1,18.10.1,19.2.1 \n Certified Asterisk 16.8-cert13 \n\n Patches \n Patch URL Revision \n https://downloads.digium.com/pub/security/AST-2022-005-16.diff Asterisk \n 16 \n https://downloads.digium.com/pub/security/AST-2022-005-18.diff Asterisk \n 18 \n https://downloads.digium.com/pub/security/AST-2022-005-19.diff Asterisk \n 19 \n https://downloads.digium.com/pub/security/AST-2022-005-16.8.diff Certified \n Asterisk \n 16.8 \n\nLinks https://issues.asterisk.org/jira/browse/ASTERISK-29945 \n \n https://downloads.asterisk.org/pub/security/AST-2022-005.html \n \n https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n https://downloads.digium.com/pub/security/AST-2022-005.pdf and \n https://downloads.digium.com/pub/security/AST-2022-005.html \n\n Revision History\n Date Editor Revisions Made \n March 3, 2022 Kevin Harwell Initial revision \n\n Asterisk Project Security Advisory - AST-2022-005\n Copyright \u00a9 2022 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202210-37\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: PJSIP: Multiple Vulnerabilities\n Date: October 31, 2022\n Bugs: #803614, #829894, #875863\n ID: 202210-37\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been found in PJSIP, the worst of which\ncould result in arbitrary code execution. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/pjproject \u003c 2.12.1 \u003e= 2.12.1\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in PJSIP. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nResolution\n=========\nAll PJSIP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/pjproject-2.12.1\"\n\nReferences\n=========\n[ 1 ] CVE-2021-32686\n https://nvd.nist.gov/vuln/detail/CVE-2021-32686\n[ 2 ] CVE-2021-37706\n https://nvd.nist.gov/vuln/detail/CVE-2021-37706\n[ 3 ] CVE-2021-41141\n https://nvd.nist.gov/vuln/detail/CVE-2021-41141\n[ 4 ] CVE-2021-43804\n https://nvd.nist.gov/vuln/detail/CVE-2021-43804\n[ 5 ] CVE-2021-43845\n https://nvd.nist.gov/vuln/detail/CVE-2021-43845\n[ 6 ] CVE-2022-21722\n https://nvd.nist.gov/vuln/detail/CVE-2022-21722\n[ 7 ] CVE-2022-21723\n https://nvd.nist.gov/vuln/detail/CVE-2022-21723\n[ 8 ] CVE-2022-23608\n https://nvd.nist.gov/vuln/detail/CVE-2022-23608\n[ 9 ] CVE-2022-24754\n https://nvd.nist.gov/vuln/detail/CVE-2022-24754\n[ 10 ] CVE-2022-24763\n https://nvd.nist.gov/vuln/detail/CVE-2022-24763\n[ 11 ] CVE-2022-24764\n https://nvd.nist.gov/vuln/detail/CVE-2022-24764\n[ 12 ] CVE-2022-24786\n https://nvd.nist.gov/vuln/detail/CVE-2022-24786\n[ 13 ] CVE-2022-24792\n https://nvd.nist.gov/vuln/detail/CVE-2022-24792\n[ 14 ] CVE-2022-24793\n https://nvd.nist.gov/vuln/detail/CVE-2022-24793\n[ 15 ] CVE-2022-31031\n https://nvd.nist.gov/vuln/detail/CVE-2022-31031\n[ 16 ] CVE-2022-39244\n https://nvd.nist.gov/vuln/detail/CVE-2022-39244\n[ 17 ] CVE-2022-39269\n https://nvd.nist.gov/vuln/detail/CVE-2022-39269\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202210-37\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5285-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nNovember 17, 2022 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301\n CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845\n CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608\n CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792\n CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651\nDebian Bug : 1014998 1018073 1014976\n\nMultiple security vulnerabilities have been found in Asterisk, an Open Source\nPrivate Branch Exchange. Buffer overflows and other programming errors could be\nexploited for information disclosure or the execution of arbitrary code. \n\nSpecial care should be taken when upgrading to this new upstream release. \nSome configuration files and options have changed in order to remedy\ncertain security vulnerabilities. Most notably the pjsip TLS listener only\naccepts TLSv1.3 connections in the default configuration now. This can be\nreverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also\nhttps://issues.asterisk.org/jira/browse/ASTERISK-29017. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nVTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\\xeajm\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-6422-1\nOctober 09, 2023\n\nring vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 23.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in Ring. \n\nSoftware Description:\n- ring: Secure and distributed voice, video, and chat platform\n\nDetails:\n\nIt was discovered that Ring incorrectly handled certain inputs. If a user or\nan automated system were tricked into opening a specially crafted input file,\na remote attacker could possibly use this issue to execute arbitrary code. \n(CVE-2021-37706)\n\nIt was discovered that Ring incorrectly handled certain inputs. If a user or\nan automated system were tricked into opening a specially crafted input file,\na remote attacker could possibly use this issue to cause a denial of service. \nThis issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. \n(CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302,\nCVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723,\nCVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754,\nCVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031,\nCVE-2022-39244)\n\nIt was discovered that Ring incorrectly handled certain inputs. If a user or\nan automated system were tricked into opening a specially crafted input file,\na remote attacker could possibly use this issue to cause a denial of service. \nThis issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722)\n\nIt was discovered that Ring incorrectly handled certain inputs. If a user or\nan automated system were tricked into opening a specially crafted input file,\na remote attacker could possibly use this issue to cause a denial of service. \n(CVE-2023-27585)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 23.04:\n jami 20230206.0~ds1-5ubuntu0.1\n jami-daemon 20230206.0~ds1-5ubuntu0.1\n\nUbuntu 20.04 LTS:\n jami 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1\n jami-daemon 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1\n ring 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1\n ring-daemon 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1\n\nUbuntu 18.04 LTS (Available with Ubuntu Pro):\n ring 20180228.1.503da2b~ds1-1ubuntu0.1~esm1\n ring-daemon 20180228.1.503da2b~ds1-1ubuntu0.1~esm1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6422-1\n CVE-2021-37706, CVE-2021-43299, CVE-2021-43300, CVE-2021-43301,\n CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845,\n CVE-2022-21722, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547,\n CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764,\n CVE-2022-24793, CVE-2022-31031, CVE-2022-39244, CVE-2023-27585\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/ring/20230206.0~ds1-5ubuntu0.1\n \nhttps://launchpad.net/ubuntu/+source/ring/20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1\n\n", "sources": [ { "db": "NVD", "id": "CVE-2022-23608" }, { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "PACKETSTORM", "id": "166226" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-23608", "trust": 3.7 }, { "db": "PACKETSTORM", "id": "166226", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2022-006237", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "169618", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169938", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.0942", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1414", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022022414", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022030601", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202202-1757", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-23608", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "175025", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "PACKETSTORM", "id": "166226" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "id": "VAR-202202-0167", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T21:06:41.019000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PJSIP Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=184333" }, { "title": "Debian CVElist Bug Report Logs: ring: CVE-2021-32686 CVE-2021-37706 CVE-2022-21723 CVE-2022-23608 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 CVE-2022-24754 CVE-2022-24763 CVE-2022-24764 CVE-2022-24793", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4e89fc7b47aa12e94340b2e2db73b906" }, { "title": "Debian Security Advisories: DSA-5285-1 asterisk -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=edc2cf0db8c0593c65c4c82227026727" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://packetstormsecurity.com/files/166226/asterisk-project-security-advisory-ast-2022-005.html" }, { "trust": 2.6, "url": "https://github.com/pjsip/pjproject/security/advisories/ghsa-ffff-m5fm-qm62" }, { "trust": 2.6, "url": "https://security.gentoo.org/glsa/202210-37" }, { "trust": 2.6, "url": "https://www.debian.org/security/2022/dsa-5285" }, { "trust": 2.5, "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f" }, { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/mar/1" }, { "trust": 2.5, "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "trust": 2.5, "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html" }, { "trust": 2.5, "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23608" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169618/gentoo-linux-security-advisory-202210-37.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-reuse-after-free-via-pjproject-dialog-set-37713" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-23608/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169938/debian-security-advisory-5285-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022022414" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022030601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0942" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1414" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43804" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24764" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21722" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37706" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24763" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24793" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43845" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21723" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43303" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43302" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005-18.diff" }, { "trust": 0.1, "url": "https://downloads.asterisk.org/pub/security/ast-2022-005.html" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005-19.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005.pdf" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29945" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005.html" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005-16.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-005-16.8.diff" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24754" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24786" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24792" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32686" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46837" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43301" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29017." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43300" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6422-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ring/20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-27585" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23537" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ring/20230206.0~ds1-5ubuntu0.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23547" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "PACKETSTORM", "id": "166226" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-23608" }, { "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "db": "PACKETSTORM", "id": "166226" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "db": "NVD", "id": "CVE-2022-23608" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-22T00:00:00", "db": "VULMON", "id": "CVE-2022-23608" }, { "date": "2023-07-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "date": "2022-03-07T16:28:25", "db": "PACKETSTORM", "id": "166226" }, { "date": "2022-11-01T13:21:55", "db": "PACKETSTORM", "id": "169618" }, { "date": "2022-11-18T14:28:10", "db": "PACKETSTORM", "id": "169938" }, { "date": "2023-10-10T14:47:37", "db": "PACKETSTORM", "id": "175025" }, { "date": "2022-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "date": "2022-02-22T20:15:07.693000", "db": "NVD", "id": "CVE-2022-23608" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-08-30T00:00:00", "db": "VULMON", "id": "CVE-2022-23608" }, { "date": "2023-07-03T08:38:00", "db": "JVNDB", "id": "JVNDB-2022-006237" }, { "date": "2022-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-1757" }, { "date": "2024-11-21T06:48:55.363000", "db": "NVD", "id": "CVE-2022-23608" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "175025" }, { "db": "CNNVD", "id": "CNNVD-202202-1757" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Teluu\u00a0Ltd.\u00a0 of \u00a0PJSIP\u00a0 Vulnerability related to use of freed memory in products from other vendors", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006237" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-1757" } ], "trust": 0.6 } }
var-202212-0244
Vulnerability from variot
An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5358-1 security@debian.org https://www.debian.org/security/ Markus Koschany February 23, 2023 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325 CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706
Multiple security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for launching a denial of service attack or the execution of arbitrary code.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u2.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmP3LTtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQLpw/8CshgHqfiBn5zx4yxf0mmnHaeXDpDmebNz0MLPJQOBHLn6IBFyAu+TpM5 o9CgBlgTx6LdXToik+0QQtG50EnCp+2gPQ+dalY7lHswTfdwqIrMIM8NUwtOo9ut DUUptPBTbUVDICh/OZfiNE3EfxAJ5Z6ktoqC/L8IqCx/S1ZwbdQJSVXAAQJJUVyT syXDNHpoYqehm6p0JKOAbYkROnCKyvfhrtu9clZgUx0lhlxGRpAMspO15mUTyxqR xLwsWAqWyfPXTZBpa6Ym8Aa8vQeDrvk3QakigvhnYHxhz51eJiH8WcsIzh2NQLW0 CsJHYx+Hq3rVUHpIWvPyR00HeKfGNu4pYzXS8RAhuKricEgxNWEQKWxYO76+xrWt avZ1ebREYG2+6AcneB3ceSCPNEg3YeySmf5RyFYy+3s307OsA8/kbSwzsi4lmBZe 1+bqDZvcb76dEz2d5bFaC9qJ3EUX3C19B4mo/bi+IW4s8YypZZX3OpmH5jCkIFKF XiEmuDj3rtrDYSzQgSCKgflXQIv63UsUn3NbZk2KIkQTZRpBfT8p5M7DWwozOCbO 9CN6gsjkM/H+YT2FfEdXMsqw7H6tl3wv1HUIj9dDaAYfxfnHGMfe3jeSBA84Ql1J +NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "17.0.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "18.9" }, { "model": "certified asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.9" }, { "model": "asterisk", "scope": "eq", "trust": 1.0, "vendor": "sangoma", "version": "20.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.15.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.7.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.29.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-42706" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian", "sources": [ { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.1 }, "cve": "CVE-2022-42706", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2022-42706", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-42706", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2080", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "db": "NVD", "id": "CVE-2022-42706" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5358-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nFebruary 23, 2023 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2022-23537 CVE-2022-23547 CVE-2022-31031 CVE-2022-37325\n CVE-2022-39244 CVE-2022-39269 CVE-2022-42705 CVE-2022-42706\n\nMultiple security vulnerabilities have been discovered in Asterisk, an Open\nSource Private Branch Exchange. Buffer overflows and other programming errors\ncould be exploited for launching a denial of service attack or the execution of\narbitrary code. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u2. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmP3LTtfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD\nRjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7\nUeQLpw/8CshgHqfiBn5zx4yxf0mmnHaeXDpDmebNz0MLPJQOBHLn6IBFyAu+TpM5\no9CgBlgTx6LdXToik+0QQtG50EnCp+2gPQ+dalY7lHswTfdwqIrMIM8NUwtOo9ut\nDUUptPBTbUVDICh/OZfiNE3EfxAJ5Z6ktoqC/L8IqCx/S1ZwbdQJSVXAAQJJUVyT\nsyXDNHpoYqehm6p0JKOAbYkROnCKyvfhrtu9clZgUx0lhlxGRpAMspO15mUTyxqR\nxLwsWAqWyfPXTZBpa6Ym8Aa8vQeDrvk3QakigvhnYHxhz51eJiH8WcsIzh2NQLW0\nCsJHYx+Hq3rVUHpIWvPyR00HeKfGNu4pYzXS8RAhuKricEgxNWEQKWxYO76+xrWt\navZ1ebREYG2+6AcneB3ceSCPNEg3YeySmf5RyFYy+3s307OsA8/kbSwzsi4lmBZe\n1+bqDZvcb76dEz2d5bFaC9qJ3EUX3C19B4mo/bi+IW4s8YypZZX3OpmH5jCkIFKF\nXiEmuDj3rtrDYSzQgSCKgflXQIv63UsUn3NbZk2KIkQTZRpBfT8p5M7DWwozOCbO\n9CN6gsjkM/H+YT2FfEdXMsqw7H6tl3wv1HUIj9dDaAYfxfnHGMfe3jeSBA84Ql1J\n+NrQctHyDGHo5WcU4ThMNawTuz+FUn/MHb4+ycyP8TjZa/RHX4M=HsMO\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2022-42706" }, { "db": "PACKETSTORM", "id": "171105" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-42706", "trust": 1.7 }, { "db": "AUSCERT", "id": "ESB-2022.6289", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202212-2080", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "171105", "trust": 0.1 } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "db": "NVD", "id": "CVE-2022-42706" } ] }, "id": "VAR-202212-0244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.75 }, "last_update_date": "2024-08-14T13:14:33.671000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Asterisk Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=216715" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-42706" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://downloads.asterisk.org/pub/security/ast-2022-009.html" }, { "trust": 1.6, "url": "https://www.debian.org/security/2023/dsa-5358" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-open-source-directory-traversal-via-getconfig-ami-actio-40002" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-42706/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6289" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37325" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42705" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42706" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23537" } ], "sources": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "db": "NVD", "id": "CVE-2022-42706" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "PACKETSTORM", "id": "171105" }, { "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "db": "NVD", "id": "CVE-2022-42706" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-23T16:33:14", "db": "PACKETSTORM", "id": "171105" }, { "date": "2022-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "date": "2022-12-05T21:15:10.227000", "db": "NVD", "id": "CVE-2022-42706" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2080" }, { "date": "2023-02-24T00:15:12.133000", "db": "NVD", "id": "CVE-2022-42706" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk Path traversal vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2080" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2080" } ], "trust": 0.6 } }
var-201208-0619
Vulnerability from variot
Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action. Asterisk is prone to a security-bypass vulnerability that affects the manager interface. An attacker can exploit this issue to bypass certain security restrictions and execute shell commands within the context of the affected application. Asterisk Project Security Advisory - AST-2012-012
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
Exploits Known No
Reported On July 13, 2012
Reported By Zubair Ashraf of IBM X-Force Research
Posted On August 30, 2012
Last Updated On August 30, 2012
Advisory Contact Matt Jordan < mjordan AT digium DOT com >
CVE Name CVE-2012-2186
Description The AMI Originate action can allow a remote user to specify
information that can be used to execute shell commands on
the system hosting Asterisk. This can result in an unwanted
escalation of permissions, as the Originate action, which
requires the "originate" class authorization, can be used
to perform actions that would typically require the
"system" class authorization. Previous attempts to prevent
this permission escalation (AST-2011-006, AST-2012-004)
have sought to do so by inspecting the names of
applications and functions passed in with the Originate
action and, if those applications/functions matched a
predefined set of values, rejecting the command if the user
lacked the "system" class authorization. As reported by IBM
X-Force Research, the "ExternalIVR" application is not
listed in the predefined set of values. The solution for
this particular vulnerability is to include the
"ExternalIVR" application in the set of defined
applications/functions that require "system" class
authorization.
Unfortunately, the approach of inspecting fields in the
Originate action against known applications/functions has a
significant flaw. The predefined set of values can be
bypassed by creative use of the Originate action or by
certain dialplan configurations, which is beyond the
ability of Asterisk to analyze at run-time. Attempting to
work around these scenarios would result in severely
restricting the applications or functions and prevent their
usage for legitimate means. As such, any additional
security vulnerabilities, where an application/function
that would normally require the "system" class
authorization can be executed by users with the "originate"
class authorization, will not be addressed. Proper system configuration can limit the impact
of such scenarios.
The next release of each version of Asterisk will contain,
in addition to the fix for the "ExternalIVR" application,
an updated README-SERIOUSLY.bestpractices.txt file.
Resolution Asterisk now checks for the "ExternalIVR" application when
processing the Originate action.
Additionally, the README-SERIOUSLY.bestpractices.txt file
has been updated. It is highly recommended that, if AMI is
utilized with accounts that have the "originate" class
authorization, Asterisk is run under a defined user that
does not have root permissions. Accounts with the
"originate" class authorization should be treated in a
similar manner to those with the "system" class
authorization. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201209-15
http://security.gentoo.org/
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: September 26, 2012 Bugs: #425050, #433750 ID: 201209-15
Synopsis
Multiple vulnerabilities have been found in Asterisk, the worst of which may allow execution of arbitrary code.
Background
Asterisk is an open source telephony engine and toolkit.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 1.8.15.1 >= 1.8.15.1
Description
Multiple vulnerabilities have been found in Asterisk:
- An error in manager.c allows shell access (CVE-2012-2186).
- An error in Asterisk could cause all RTP ports to be exhausted (CVE-2012-3812).
- A double-free error could occur when two parties attempt to manipulate the same voicemail account simultaneously (CVE-2012-3863).
- Asterisk does not properly implement certain ACL rules (CVE-2012-4737).
Impact
A remote, authenticated attacker could execute arbitrary code with the privileges of the process, cause a Denial of Service condition, or bypass outbound call restrictions.
Workaround
There is no known workaround at this time.
Resolution
All Asterisk users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.8.15.1"
References
[ 1 ] CVE-2012-2186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186 [ 2 ] CVE-2012-3812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812 [ 3 ] CVE-2012-3863 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863 [ 4 ] CVE-2012-4737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201209-15.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2550-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff September 18, 2012 http://www.debian.org/security/faq
Package : asterisk Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2012-2186 CVE-2012-3812 CVE-2012-3863 CVE-2012-4737
Several vulnerabilities were discovered in Asterisk, a PBX and telephony toolkit, allowing privilege escalation in the Asterisk Manager, denial of service or privilege escalation.
More detailed information can be found in the Asterisk advisories: http://downloads.asterisk.org/pub/security/AST-2012-010.html http://downloads.asterisk.org/pub/security/AST-2012-011.html http://downloads.asterisk.org/pub/security/AST-2012-012.html http://downloads.asterisk.org/pub/security/AST-2012-013.html
For the stable distribution (squeeze), these problems have been fixed in version 1:1.6.2.9-2+squeeze7.
For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 1:1.8.13.1~dfsg-1.
We recommend that you upgrade your asterisk packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlBYrLoACgkQXm3vHE4uylqDBgCfTQnp2Z1XZSgJkg1L84SDPnjK muwAoOINdMCYMfcEc8spGQ7wrCWPKGaR =FRM+ -----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Debian update for asterisk
SECUNIA ADVISORY ID: SA50687
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50687/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50687
RELEASE DATE: 2012-09-19
DISCUSS ADVISORY: http://secunia.com/advisories/50687/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/50687/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50687
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Debian has issued an update for asterisk.
For more information: SA49814 SA50456
SOLUTION: Apply updated packages via the apt-get package manager.
ORIGINAL ADVISORY: DSA-2550-1: http://www.debian.org/security/2012/dsa-2550
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0619", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.0.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.8.5.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.1.3" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.8.5" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "1.8.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.2.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.3, "vendor": "asterisk", "version": "1.8.11" }, { "model": "open source", "scope": "eq", "trust": 1.3, "vendor": "asterisk", "version": "1.8.3.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11.1" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "10.7.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.8.0" }, { "model": "certified asterisk", "scope": "lte", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.1.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.8.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.10.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2.2" }, { "model": "business edition", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "c.3.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.0.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.4.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.4.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.3.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.1" }, { "model": "business edition", "scope": "lte", "trust": 1.0, "vendor": "asterisk", "version": "c.3.7.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.1.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.4.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.3.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.6.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.0" }, { "model": "digiumphones", "scope": "lte", "trust": 1.0, "vendor": "asterisk", "version": "10.7.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.8.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.10.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.1.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.1" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "1.8.15.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.4.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.1.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.4.4" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.2.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.1.2" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2.4" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.15.1" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "10.7.1" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.11-cert6" }, { "model": "asterisk business edition", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "c.3.x" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.x" }, { "model": "asterisk business edition", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "c.3.7.6" }, { "model": "certified asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.11" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "10.x" }, { "model": "asterisk with digiumphones", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "10.x.x-digiumphones" }, { "model": "asterisk with digiumphones", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "10.7.1-digiumphones" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.7" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.2.17.1" }, { "model": "open source", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.6.1.23" }, { "model": "digiumphones 10.5.2-digiumphones", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "digiumphones 10.5.1-digiumphones", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.7.5", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.7.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.7.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.6.4", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.6.3", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.6.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.3.2", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "3" }, { "model": "business edition c.3.2", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "2" }, { "model": "business edition c.3.1.0", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.1", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1" }, { "model": "certified asterisk 1.8.11-cert6", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "open source", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "10.7.1" }, { "model": "open source", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.8.15.1" }, { "model": "digiumphones 10.7.1-digiumphones", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "business edition c.3.7.6", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null } ], "sources": [ { "db": "BID", "id": "55351" }, { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "CNNVD", "id": "CNNVD-201208-683" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:digium:asterisk_business_edition", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:asterisk_digiumphones", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004020" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zubair Ashraf of IBM X-Force Research", "sources": [ { "db": "BID", "id": "55351" } ], "trust": 0.3 }, "cve": "CVE-2012-2186", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2012-2186", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-2186", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-2186", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201208-683", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "CNNVD", "id": "CNNVD-201208-683" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action. Asterisk is prone to a security-bypass vulnerability that affects the manager interface. \nAn attacker can exploit this issue to bypass certain security restrictions and execute shell commands within the context of the affected application. Asterisk Project Security Advisory - AST-2012-012\n\n Product Asterisk \n Summary Asterisk Manager User Unauthorized Shell Access \n Nature of Advisory Permission Escalation \n Susceptibility Remote Authenticated Sessions \n Severity Minor \n Exploits Known No \n Reported On July 13, 2012 \n Reported By Zubair Ashraf of IBM X-Force Research \n Posted On August 30, 2012 \n Last Updated On August 30, 2012 \n Advisory Contact Matt Jordan \u003c mjordan AT digium DOT com \u003e \n CVE Name CVE-2012-2186 \n\n Description The AMI Originate action can allow a remote user to specify \n information that can be used to execute shell commands on \n the system hosting Asterisk. This can result in an unwanted \n escalation of permissions, as the Originate action, which \n requires the \"originate\" class authorization, can be used \n to perform actions that would typically require the \n \"system\" class authorization. Previous attempts to prevent \n this permission escalation (AST-2011-006, AST-2012-004) \n have sought to do so by inspecting the names of \n applications and functions passed in with the Originate \n action and, if those applications/functions matched a \n predefined set of values, rejecting the command if the user \n lacked the \"system\" class authorization. As reported by IBM \n X-Force Research, the \"ExternalIVR\" application is not \n listed in the predefined set of values. The solution for \n this particular vulnerability is to include the \n \"ExternalIVR\" application in the set of defined \n applications/functions that require \"system\" class \n authorization. \n \n Unfortunately, the approach of inspecting fields in the \n Originate action against known applications/functions has a \n significant flaw. The predefined set of values can be \n bypassed by creative use of the Originate action or by \n certain dialplan configurations, which is beyond the \n ability of Asterisk to analyze at run-time. Attempting to \n work around these scenarios would result in severely \n restricting the applications or functions and prevent their \n usage for legitimate means. As such, any additional \n security vulnerabilities, where an application/function \n that would normally require the \"system\" class \n authorization can be executed by users with the \"originate\" \n class authorization, will not be addressed. Proper system configuration can limit the impact \n of such scenarios. \n \n The next release of each version of Asterisk will contain, \n in addition to the fix for the \"ExternalIVR\" application, \n an updated README-SERIOUSLY.bestpractices.txt file. \n\n Resolution Asterisk now checks for the \"ExternalIVR\" application when \n processing the Originate action. \n \n Additionally, the README-SERIOUSLY.bestpractices.txt file \n has been updated. It is highly recommended that, if AMI is \n utilized with accounts that have the \"originate\" class \n authorization, Asterisk is run under a defined user that \n does not have root permissions. Accounts with the \n \"originate\" class authorization should be treated in a \n similar manner to those with the \"system\" class \n authorization. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201209-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Asterisk: Multiple vulnerabilities\n Date: September 26, 2012\n Bugs: #425050, #433750\n ID: 201209-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Asterisk, the worst of\nwhich may allow execution of arbitrary code. \n\nBackground\n==========\n\nAsterisk is an open source telephony engine and toolkit. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/asterisk \u003c 1.8.15.1 \u003e= 1.8.15.1\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in Asterisk:\n\n* An error in manager.c allows shell access (CVE-2012-2186). \n* An error in Asterisk could cause all RTP ports to be exhausted\n (CVE-2012-3812). \n* A double-free error could occur when two parties attempt to\n manipulate the same voicemail account simultaneously (CVE-2012-3863). \n* Asterisk does not properly implement certain ACL rules\n (CVE-2012-4737). \n\nImpact\n======\n\nA remote, authenticated attacker could execute arbitrary code with the\nprivileges of the process, cause a Denial of Service condition, or\nbypass outbound call restrictions. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/asterisk-1.8.15.1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-2186\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186\n[ 2 ] CVE-2012-3812\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812\n[ 3 ] CVE-2012-3863\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863\n[ 4 ] CVE-2012-4737\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201209-15.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2550-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nSeptember 18, 2012 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2012-2186 CVE-2012-3812 CVE-2012-3863 CVE-2012-4737\n\nSeveral vulnerabilities were discovered in Asterisk, a PBX and telephony \ntoolkit, allowing privilege escalation in the Asterisk Manager, denial of\nservice or privilege escalation. \n\nMore detailed information can be found in the Asterisk advisories:\nhttp://downloads.asterisk.org/pub/security/AST-2012-010.html \nhttp://downloads.asterisk.org/pub/security/AST-2012-011.html \nhttp://downloads.asterisk.org/pub/security/AST-2012-012.html \nhttp://downloads.asterisk.org/pub/security/AST-2012-013.html \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 1:1.6.2.9-2+squeeze7. \n\nFor the testing distribution (wheezy) and the unstable distribution (sid), \nthese problems have been fixed in version 1:1.8.13.1~dfsg-1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niEYEARECAAYFAlBYrLoACgkQXm3vHE4uylqDBgCfTQnp2Z1XZSgJkg1L84SDPnjK\nmuwAoOINdMCYMfcEc8spGQ7wrCWPKGaR\n=FRM+\n-----END PGP SIGNATURE-----\n\n\n. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for asterisk\n\nSECUNIA ADVISORY ID:\nSA50687\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50687/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50687\n\nRELEASE DATE:\n2012-09-19\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50687/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50687/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50687\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nDebian has issued an update for asterisk. \n\nFor more information:\nSA49814\nSA50456\n\nSOLUTION:\nApply updated packages via the apt-get package manager. \n\nORIGINAL ADVISORY:\nDSA-2550-1:\nhttp://www.debian.org/security/2012/dsa-2550\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-2186" }, { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "BID", "id": "55351" }, { "db": "PACKETSTORM", "id": "116096" }, { "db": "PACKETSTORM", "id": "116914" }, { "db": "PACKETSTORM", "id": "116960" }, { "db": "PACKETSTORM", "id": "116896" }, { "db": "PACKETSTORM", "id": "116646" }, { "db": "PACKETSTORM", "id": "116705" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-2186", "trust": 3.1 }, { "db": "SECUNIA", "id": "50756", "trust": 1.1 }, { "db": "SECUNIA", "id": "50687", "trust": 1.1 }, { "db": "SECTRACK", "id": "1027460", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-004020", "trust": 0.8 }, { "db": "NSFOCUS", "id": "20761", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201208-683", "trust": 0.6 }, { "db": "BID", "id": "55351", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "116096", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116914", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116960", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116896", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116646", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116705", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "55351" }, { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "PACKETSTORM", "id": "116096" }, { "db": "PACKETSTORM", "id": "116914" }, { "db": "PACKETSTORM", "id": "116960" }, { "db": "PACKETSTORM", "id": "116896" }, { "db": "PACKETSTORM", "id": "116646" }, { "db": "PACKETSTORM", "id": "116705" }, { "db": "CNNVD", "id": "CNNVD-201208-683" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "id": "VAR-201208-0619", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T21:55:51.423000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2012-012", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html" }, { "title": "DSA-2550", "trust": 0.8, "url": "http://www.debian.org/security/2012/dsa-2550" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-nocwe", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://downloads.asterisk.org/pub/security/ast-2012-012.html" }, { "trust": 1.1, "url": "http://www.debian.org/security/2012/dsa-2550" }, { "trust": 1.0, "url": "http://secunia.com/advisories/50756" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1027460" }, { "trust": 1.0, "url": "http://secunia.com/advisories/50687" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2186" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2186" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20761" }, { "trust": 0.4, "url": "https://issues.asterisk.org/jira/browse/asterisk-20132" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2186" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3812" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4737" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3863" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/blog/325/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-012.pdf" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-012.html" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-012-1.8.diff" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3863" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2186" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201209-15.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3812" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4737" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50756/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50756/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50756" }, { "trust": 0.1, "url": "http://www.gentoo.org/security/en/glsa/glsa-201209-15.xml" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-011.html" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-010.html" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-013.html" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50687" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50687/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50687/" } ], "sources": [ { "db": "BID", "id": "55351" }, { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "PACKETSTORM", "id": "116096" }, { "db": "PACKETSTORM", "id": "116914" }, { "db": "PACKETSTORM", "id": "116960" }, { "db": "PACKETSTORM", "id": "116896" }, { "db": "PACKETSTORM", "id": "116646" }, { "db": "PACKETSTORM", "id": "116705" }, { "db": "CNNVD", "id": "CNNVD-201208-683" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "55351" }, { "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "db": "PACKETSTORM", "id": "116096" }, { "db": "PACKETSTORM", "id": "116914" }, { "db": "PACKETSTORM", "id": "116960" }, { "db": "PACKETSTORM", "id": "116896" }, { "db": "PACKETSTORM", "id": "116646" }, { "db": "PACKETSTORM", "id": "116705" }, { "db": "CNNVD", "id": "CNNVD-201208-683" }, { "db": "NVD", "id": "CVE-2012-2186" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-30T00:00:00", "db": "BID", "id": "55351" }, { "date": "2012-09-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "date": "2012-08-30T21:46:42", "db": "PACKETSTORM", "id": "116096" }, { "date": "2012-09-27T00:09:12", "db": "PACKETSTORM", "id": "116914" }, { "date": "2012-09-28T03:46:47", "db": "PACKETSTORM", "id": "116960" }, { "date": "2012-09-26T22:17:20", "db": "PACKETSTORM", "id": "116896" }, { "date": "2012-09-19T07:22:56", "db": "PACKETSTORM", "id": "116646" }, { "date": "2012-09-19T10:31:08", "db": "PACKETSTORM", "id": "116705" }, { "date": "2012-08-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-683" }, { "date": "2012-08-31T14:55:00.950000", "db": "NVD", "id": "CVE-2012-2186" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-13T22:13:00", "db": "BID", "id": "55351" }, { "date": "2012-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004020" }, { "date": "2012-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-683" }, { "date": "2024-11-21T01:38:40.223000", "db": "NVD", "id": "CVE-2012-2186" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "116096" }, { "db": "CNNVD", "id": "CNNVD-201208-683" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Asterisk Product of main/manager.c Vulnerable to arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Access Validation Error", "sources": [ { "db": "BID", "id": "55351" } ], "trust": 0.3 } }
var-201911-1367
Vulnerability from variot
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940. This vulnerability CVE-CVE-2019-18940 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voicemail, multi-party voice conferencing, interactive voice response (IVR), and more. The vulnerability originates from improper design or implementation during code development of a network system or product. An attacker could use this vulnerability to execute malicious code. Asterisk Project Security Advisory -
Product Asterisk
Summary Re-invite with T.38 and malformed SDP causes crash.
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity Minor
Exploits Known No
Reported On November 07, 2019
Reported By Salah Ahmed
Posted On November 21, 2019
Last Updated On November 21, 2019
Advisory Contact bford AT sangoma DOT com
CVE Name CVE-2019-18976
Description If Asterisk receives a re-invite initiating T.38
faxing and has a port of 0 and no c line in the SDP, a
crash will occur.
Modules Affected res_pjsip_t38.c
Resolution If T.38 faxing is not needed, then the “t38_udptl”
configuration option in pjsip.conf can be set to “no” to
disable the functionality. This option automatically
defaults to “no” and would have to be manually turned on to
experience this crash.
If T.38 faxing is needed, then Asterisk should be upgraded
to a fixed version.
Affected Versions
Product Release
Series
Asterisk Open Source 13.x All versions
Certified Asterisk 13.21 All versions
Corrected In
Product Release
Asterisk Open Source 13.29.2
Certified Asterisk 13.21-cert5
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2019-008-13.diff Asterisk 13
http://downloads.asterisk.org/pub/security/AST-2019-008-13.21.diff Certified
Asterisk
13.21-cert5
Links https://issues.asterisk.org/jira/browse/ASTERISK-28612
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at http://downloads.digium.com/pub/security/.pdf
and http://downloads.digium.com/pub/security/.html
Revision History
Date Editor Revisions Made
November 12, 2019 Ben Ford Initial Revision
November 21, 2019 Ben Ford Added “Posted On” date
Asterisk Project Security Advisory -
Copyright © 2019 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "digium", "version": "13.21" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "digium", "version": "13.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "digium", "version": "13.29.1" }, { "model": "asterisk", "scope": "lte", "trust": 0.8, "vendor": "digium", "version": "13.x" }, { "model": "certified asterisk", "scope": "lte", "trust": 0.8, "vendor": "digium", "version": "13.21-x" }, { "model": "asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=13.*" }, { "model": "certified asterisk", "scope": "lte", "trust": 0.6, "vendor": "sangoma", "version": "\u003c=13.21-*" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:digium:asterisk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012748" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bford", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1292" } ], "trust": 0.6 }, "cve": "CVE-2019-18976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-18976", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-01312", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-18976", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-18976", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-18976", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-18976", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-01312", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-1292", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940. This vulnerability CVE-CVE-2019-18940 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sangoma Technologies Asterisk is an open source telephone exchange (PBX) system software. The software supports voicemail, multi-party voice conferencing, interactive voice response (IVR), and more. The vulnerability originates from improper design or implementation during code development of a network system or product. An attacker could use this vulnerability to execute malicious code. Asterisk Project Security Advisory -\n\n Product Asterisk \n Summary Re-invite with T.38 and malformed SDP causes crash. \n Nature of Advisory Remote Crash \n Susceptibility Remote Authenticated Sessions \n Severity Minor \n Exploits Known No \n Reported On November 07, 2019 \n Reported By Salah Ahmed \n Posted On November 21, 2019 \n Last Updated On November 21, 2019 \n Advisory Contact bford AT sangoma DOT com \n CVE Name CVE-2019-18976 \n\n Description If Asterisk receives a re-invite initiating T.38 \n faxing and has a port of 0 and no c line in the SDP, a \n crash will occur. \n Modules Affected res_pjsip_t38.c \n\n Resolution If T.38 faxing is not needed, then the \u201ct38_udptl\u201d \n configuration option in pjsip.conf can be set to \u201cno\u201d to \n disable the functionality. This option automatically \n defaults to \u201cno\u201d and would have to be manually turned on to \n experience this crash. \n \n If T.38 faxing is needed, then Asterisk should be upgraded \n to a fixed version. \n\n Affected Versions \n Product Release \n Series \n Asterisk Open Source 13.x All versions \n Certified Asterisk 13.21 All versions \n\n Corrected In \n Product Release \n Asterisk Open Source 13.29.2 \n Certified Asterisk 13.21-cert5 \n\n Patches \n SVN URL Revision \n http://downloads.asterisk.org/pub/security/AST-2019-008-13.diff Asterisk 13 \n http://downloads.asterisk.org/pub/security/AST-2019-008-13.21.diff Certified \n Asterisk \n 13.21-cert5 \n\n Links https://issues.asterisk.org/jira/browse/ASTERISK-28612 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at http://downloads.digium.com/pub/security/.pdf \n and http://downloads.digium.com/pub/security/.html \n\n Revision History\n Date Editor Revisions Made \n November 12, 2019 Ben Ford Initial Revision \n November 21, 2019 Ben Ford Added \u201cPosted On\u201d date \n\n Asterisk Project Security Advisory -\n Copyright \u00a9 2019 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form", "sources": [ { "db": "NVD", "id": "CVE-2019-18976" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "PACKETSTORM", "id": "155436" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18976", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "155436", "trust": 1.7 }, { "db": "CS-HELP", "id": "SB2019112218", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-012748", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-01312", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4421", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-1292", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "PACKETSTORM", "id": "155436" }, { "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "id": "VAR-201911-1367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" } ], "trust": 0.948297215 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" } ] }, "last_update_date": "2024-11-23T21:52:07.503000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2019-008", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2019-008.html" }, { "title": "Security Advisories", "trust": 0.8, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "title": "Patch for Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Code Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/196675" }, { "title": "Sangoma Technologies Asterisk and Sangoma Technologies Certified Asterisk Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104688" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "CNNVD", "id": "CNNVD-201911-1292" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://seclists.org/fulldisclosure/2019/nov/20" }, { "trust": 2.2, "url": "http://downloads.asterisk.org/pub/security/ast-2019-008.html" }, { "trust": 2.2, "url": "https://packetstormsecurity.com/files/155436/asterisk-project-security-advisory-ast-2019-008.html" }, { "trust": 1.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2019112218?affchecked=1" }, { "trust": 1.6, "url": "https://www.asterisk.org/downloads/security-advisories" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18976" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18976" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-007.html" }, { "trust": 0.6, "url": "http://downloads.asterisk.org/pub/security/ast-2019-006.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-denial-of-service-via-t-38-sdp-re-invite-30937" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4421/" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-008-13.diff" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-28612" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/.pdf" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/.html" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2019-008-13.21.diff" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "PACKETSTORM", "id": "155436" }, { "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-01312" }, { "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "db": "PACKETSTORM", "id": "155436" }, { "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "db": "NVD", "id": "CVE-2019-18976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-01312" }, { "date": "2019-12-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "date": "2019-11-21T23:55:55", "db": "PACKETSTORM", "id": "155436" }, { "date": "2019-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "date": "2019-11-22T17:15:11.833000", "db": "NVD", "id": "CVE-2019-18976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-01312" }, { "date": "2019-12-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012748" }, { "date": "2022-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1292" }, { "date": "2024-11-21T04:33:55.320000", "db": "NVD", "id": "CVE-2019-18976" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1292" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sangoma Asterisk and Certified Asterisk In NULL Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012748" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1292" } ], "trust": 0.6 } }
var-202112-2083
Vulnerability from variot
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. PJSIP Exists in an integer underflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-004
Product Asterisk
Summary pjproject: possible integer underflow on STUN
message
Nature of Advisory Arbitrary code execution
Susceptibility Remote unauthenticated sessions
Severity Major
Exploits Known Yes
Reported On March 3, 2022
Reported By Sauw Ming
Posted On March 4, 2022
Last Updated On March 3, 2022
Advisory Contact kharwell AT sangoma DOT com
CVE Name CVE-2021-37706
Description The header length on incoming STUN messages that
contain an ERROR-CODE attribute is not properly
checked. This can result in an integer underflow.
Note, this requires ICE or WebRTC support to be in use
with a malicious remote party.
Modules Affected bundled pjproject
Resolution If you use “with-pjproject-bundled” then upgrade to, or
install one of, the versions of Asterisk listed below.
Otherwise install the appropriate version of pjproject that
contains the patch.
Affected Versions
Product Release Series
Asterisk Open Source 16.x All versions
Asterisk Open Source 18.x All versions
Asterisk Open Source 19.x All versions
Certified Asterisk 16.x All versions
Corrected In
Product Release
Asterisk Open Source 16.24.1,18.10.1,19.2.1
Certified Asterisk 16.8-cert13
Patches
Patch URL Revision
https://downloads.digium.com/pub/security/AST-2022-004-16.diff Asterisk
16
https://downloads.digium.com/pub/security/AST-2022-004-18.diff Asterisk
18
https://downloads.digium.com/pub/security/AST-2022-004-19.diff Asterisk
19
https://downloads.digium.com/pub/security/AST-2022-004-16.8.diff Certified
Asterisk
16.8
Links https://issues.asterisk.org/jira/browse/ASTERISK-29945
https://downloads.asterisk.org/pub/security/AST-2022-004.html
https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
https://downloads.digium.com/pub/security/AST-2022-004.pdf and
https://downloads.digium.com/pub/security/AST-2022-004.html
Revision History
Date Editor Revisions Made
March 3, 2022 Kevin Harwell Initial revision
Asterisk Project Security Advisory - AST-2022-004
Copyright © 2022 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-37
https://security.gentoo.org/
Severity: Normal Title: PJSIP: Multiple Vulnerabilities Date: October 31, 2022 Bugs: #803614, #829894, #875863 ID: 202210-37
Synopsis
Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/pjproject < 2.12.1 >= 2.12.1
Description
Multiple vulnerabilities have been discovered in PJSIP. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Resolution
All PJSIP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.12.1"
References
[ 1 ] CVE-2021-32686 https://nvd.nist.gov/vuln/detail/CVE-2021-32686 [ 2 ] CVE-2021-37706 https://nvd.nist.gov/vuln/detail/CVE-2021-37706 [ 3 ] CVE-2021-41141 https://nvd.nist.gov/vuln/detail/CVE-2021-41141 [ 4 ] CVE-2021-43804 https://nvd.nist.gov/vuln/detail/CVE-2021-43804 [ 5 ] CVE-2021-43845 https://nvd.nist.gov/vuln/detail/CVE-2021-43845 [ 6 ] CVE-2022-21722 https://nvd.nist.gov/vuln/detail/CVE-2022-21722 [ 7 ] CVE-2022-21723 https://nvd.nist.gov/vuln/detail/CVE-2022-21723 [ 8 ] CVE-2022-23608 https://nvd.nist.gov/vuln/detail/CVE-2022-23608 [ 9 ] CVE-2022-24754 https://nvd.nist.gov/vuln/detail/CVE-2022-24754 [ 10 ] CVE-2022-24763 https://nvd.nist.gov/vuln/detail/CVE-2022-24763 [ 11 ] CVE-2022-24764 https://nvd.nist.gov/vuln/detail/CVE-2022-24764 [ 12 ] CVE-2022-24786 https://nvd.nist.gov/vuln/detail/CVE-2022-24786 [ 13 ] CVE-2022-24792 https://nvd.nist.gov/vuln/detail/CVE-2022-24792 [ 14 ] CVE-2022-24793 https://nvd.nist.gov/vuln/detail/CVE-2022-24793 [ 15 ] CVE-2022-31031 https://nvd.nist.gov/vuln/detail/CVE-2022-31031 [ 16 ] CVE-2022-39244 https://nvd.nist.gov/vuln/detail/CVE-2022-39244 [ 17 ] CVE-2022-39269 https://nvd.nist.gov/vuln/detail/CVE-2022-39269
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-37
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5285-1 security@debian.org https://www.debian.org/security/ Markus Koschany November 17, 2022 https://www.debian.org/security/faq
Package : asterisk CVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608 CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792 CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651 Debian Bug : 1014998 1018073 1014976
Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code.
Special care should be taken when upgrading to this new upstream release. Some configuration files and options have changed in order to remedy certain security vulnerabilities. Most notably the pjsip TLS listener only accepts TLSv1.3 connections in the default configuration now. This can be reverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also https://issues.asterisk.org/jira/browse/ASTERISK-29017.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u1.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmN2qoFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeR0pQ/+Kr+FWFeFyrkFTyVv5BGBJug+EvZzzC2JZoI/TNsiAWQi/BZTQJ0pmdZr EHokqN7Z35EqZW6sj5aypdK7bOv4N+uv6P59xROk1KjEEG6XttGJ2BUvffWYWEXo k6+ou/yfAxU72Ufd1eOcMtjyGeN0CljmemIJ5Cywpnaw8YArP+VzRK2NEth0gCmJ TAfSvIPFaS7jB6fEg8KESOpmvtlqEJUh5sjP2t+OOEc3AoNBBuj4ZC44SQ1nif6k jEbmLFnJYQF8dP+IasZ3SY80N+BeuGiylZQ6w1ZvuYuUAK3jhHQ3CJvTQ4sEqNQV Zva6t0kHOEKVxKg412oEpQ0ihR+EBF/lnECu7iR2HTKk8xteNwio5qeeW/joTAJx OTYlHTtERTZIiaHdmV3nmGYgrTLeDHClilCnJrQuyXF+LVHjxBWDh7WS83zSrdIH gNP0eZ5UEjrpomf1yKqHVUsji63eSWACdFVXJLACMwpuevq8qgV6zASD+VuUd36r foEOKVj+FIHehWSef9pP48Na8bOn0EDVqtZEPOjE6o8Y8PjgSf7BSNogppZncldw VREox9NsxGM9hSVh3lVBWL8lT76HQVzXjfXXXoIEFDiGokNRV/dNTuhhb/mh0zxr VTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\xeajm -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6422-2 October 24, 2023
ring vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
Summary:
Several security issues were fixed in Ring.
Software Description: - ring: Secure and distributed voice, video, and chat platform
Details:
It was discovered that Ring incorrectly handled certain inputs. (CVE-2021-37706)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585)
Original advisory details:
It was discovered that Ring incorrectly handled certain inputs. (CVE-2021-37706)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302, CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723, CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754, CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031, CVE-2022-39244)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722)
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-27585)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10: jami 20230206.0~ds2-1.3ubuntu0.1 jami-daemon 20230206.0~ds2-1.3ubuntu0.1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6422-2 https://ubuntu.com/security/notices/USN-6422-1 CVE-2021-37706, CVE-2023-27585
Package Information: https://launchpad.net/ubuntu/+source/ring/20230206.0~ds2-1.3ubuntu0.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-2083", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pjsip", "scope": "lte", "trust": 1.0, "vendor": "teluu", "version": "2.11.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "19.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.10.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "19.2.1" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "certified asterisk", "scope": "lt", "trust": 1.0, "vendor": "asterisk", "version": "16.8.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.24.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "asterisk", "scope": null, "trust": 0.8, "vendor": "sangoma", "version": null }, { "model": "certified asterisk", "scope": null, "trust": 0.8, "vendor": "asterisk", "version": null }, { "model": "pjsip", "scope": null, "trust": 0.8, "vendor": "teluu", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" } ], "trust": 0.2 }, "cve": "CVE-2021-37706", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2021-37706", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-37706", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "security-advisories@github.com", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-37706", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37706", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37706", "trust": 1.0, "value": "CRITICAL" }, { "author": "security-advisories@github.com", "id": "CVE-2021-37706", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-37706", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202112-2179", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2021-37706", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "db": "NVD", "id": "CVE-2021-37706" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim\u2019s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim\u2019s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. PJSIP Exists in an integer underflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Asterisk Project Security Advisory - AST-2022-004\n\n Product Asterisk \n Summary pjproject: possible integer underflow on STUN \n message \n Nature of Advisory Arbitrary code execution \n Susceptibility Remote unauthenticated sessions \n Severity Major \n Exploits Known Yes \n Reported On March 3, 2022 \n Reported By Sauw Ming \n Posted On March 4, 2022 \n Last Updated On March 3, 2022 \n Advisory Contact kharwell AT sangoma DOT com \n CVE Name CVE-2021-37706 \n\n Description The header length on incoming STUN messages that \n contain an ERROR-CODE attribute is not properly \n checked. This can result in an integer underflow. \n Note, this requires ICE or WebRTC support to be in use \n with a malicious remote party. \n Modules Affected bundled pjproject \n\n Resolution If you use \u201cwith-pjproject-bundled\u201d then upgrade to, or \n install one of, the versions of Asterisk listed below. \n Otherwise install the appropriate version of pjproject that \n contains the patch. \n\n Affected Versions\n Product Release Series \n Asterisk Open Source 16.x All versions \n Asterisk Open Source 18.x All versions \n Asterisk Open Source 19.x All versions \n Certified Asterisk 16.x All versions \n\n Corrected In\n Product Release \n Asterisk Open Source 16.24.1,18.10.1,19.2.1 \n Certified Asterisk 16.8-cert13 \n\n Patches \n Patch URL Revision \n https://downloads.digium.com/pub/security/AST-2022-004-16.diff Asterisk \n 16 \n https://downloads.digium.com/pub/security/AST-2022-004-18.diff Asterisk \n 18 \n https://downloads.digium.com/pub/security/AST-2022-004-19.diff Asterisk \n 19 \n https://downloads.digium.com/pub/security/AST-2022-004-16.8.diff Certified \n Asterisk \n 16.8 \n\nLinks https://issues.asterisk.org/jira/browse/ASTERISK-29945 \n \n https://downloads.asterisk.org/pub/security/AST-2022-004.html \n \n https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n https://downloads.digium.com/pub/security/AST-2022-004.pdf and \n https://downloads.digium.com/pub/security/AST-2022-004.html \n\n Revision History\n Date Editor Revisions Made \n March 3, 2022 Kevin Harwell Initial revision \n\n Asterisk Project Security Advisory - AST-2022-004\n Copyright \u00a9 2022 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202210-37\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: PJSIP: Multiple Vulnerabilities\n Date: October 31, 2022\n Bugs: #803614, #829894, #875863\n ID: 202210-37\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been found in PJSIP, the worst of which\ncould result in arbitrary code execution. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/pjproject \u003c 2.12.1 \u003e= 2.12.1\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in PJSIP. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nResolution\n=========\nAll PJSIP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/pjproject-2.12.1\"\n\nReferences\n=========\n[ 1 ] CVE-2021-32686\n https://nvd.nist.gov/vuln/detail/CVE-2021-32686\n[ 2 ] CVE-2021-37706\n https://nvd.nist.gov/vuln/detail/CVE-2021-37706\n[ 3 ] CVE-2021-41141\n https://nvd.nist.gov/vuln/detail/CVE-2021-41141\n[ 4 ] CVE-2021-43804\n https://nvd.nist.gov/vuln/detail/CVE-2021-43804\n[ 5 ] CVE-2021-43845\n https://nvd.nist.gov/vuln/detail/CVE-2021-43845\n[ 6 ] CVE-2022-21722\n https://nvd.nist.gov/vuln/detail/CVE-2022-21722\n[ 7 ] CVE-2022-21723\n https://nvd.nist.gov/vuln/detail/CVE-2022-21723\n[ 8 ] CVE-2022-23608\n https://nvd.nist.gov/vuln/detail/CVE-2022-23608\n[ 9 ] CVE-2022-24754\n https://nvd.nist.gov/vuln/detail/CVE-2022-24754\n[ 10 ] CVE-2022-24763\n https://nvd.nist.gov/vuln/detail/CVE-2022-24763\n[ 11 ] CVE-2022-24764\n https://nvd.nist.gov/vuln/detail/CVE-2022-24764\n[ 12 ] CVE-2022-24786\n https://nvd.nist.gov/vuln/detail/CVE-2022-24786\n[ 13 ] CVE-2022-24792\n https://nvd.nist.gov/vuln/detail/CVE-2022-24792\n[ 14 ] CVE-2022-24793\n https://nvd.nist.gov/vuln/detail/CVE-2022-24793\n[ 15 ] CVE-2022-31031\n https://nvd.nist.gov/vuln/detail/CVE-2022-31031\n[ 16 ] CVE-2022-39244\n https://nvd.nist.gov/vuln/detail/CVE-2022-39244\n[ 17 ] CVE-2022-39269\n https://nvd.nist.gov/vuln/detail/CVE-2022-39269\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202210-37\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5285-1 security@debian.org\nhttps://www.debian.org/security/ Markus Koschany\nNovember 17, 2022 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : asterisk\nCVE ID : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301\n CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845\n CVE-2021-46837 CVE-2022-21722 CVE-2022-21723 CVE-2022-23608\n CVE-2022-24763 CVE-2022-24764 CVE-2022-24786 CVE-2022-24792\n CVE-2022-24793 CVE-2022-26498 CVE-2022-26499 CVE-2022-26651\nDebian Bug : 1014998 1018073 1014976\n\nMultiple security vulnerabilities have been found in Asterisk, an Open Source\nPrivate Branch Exchange. Buffer overflows and other programming errors could be\nexploited for information disclosure or the execution of arbitrary code. \n\nSpecial care should be taken when upgrading to this new upstream release. \nSome configuration files and options have changed in order to remedy\ncertain security vulnerabilities. Most notably the pjsip TLS listener only\naccepts TLSv1.3 connections in the default configuration now. This can be\nreverted by adding method=tlsv1_2 to the transport in pjsip.conf. See also\nhttps://issues.asterisk.org/jira/browse/ASTERISK-29017. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:16.28.0~dfsg-0+deb11u1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFor the detailed security status of asterisk please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/asterisk\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nVTKBboC6ijQVCdVQ7UdGFnoVXOWW2gy8sdam40ELBUCGDD5XI7A\\xeajm\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-6422-2\nOctober 24, 2023\n\nring vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 23.10\n\nSummary:\n\nSeveral security issues were fixed in Ring. \n\nSoftware Description:\n- ring: Secure and distributed voice, video, and chat platform\n\nDetails:\n\nIt was discovered that Ring incorrectly handled certain inputs. \n(CVE-2021-37706)\n\nIt was discovered that Ring incorrectly handled certain inputs. If a user or\nan automated system were tricked into opening a specially crafted input file,\na remote attacker could possibly use this issue to cause a denial of service. \n(CVE-2023-27585)\n\n\nOriginal advisory details:\n\n\n It was discovered that Ring incorrectly handled certain inputs. \n (CVE-2021-37706)\n\n It was discovered that Ring incorrectly handled certain inputs. If a user or\n an automated system were tricked into opening a specially crafted input file,\n a remote attacker could possibly use this issue to cause a denial of service. \n This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. \n (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302,\n CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723,\n CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754,\n CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031,\n CVE-2022-39244)\n\n It was discovered that Ring incorrectly handled certain inputs. If a user or\n an automated system were tricked into opening a specially crafted input file,\n a remote attacker could possibly use this issue to cause a denial of service. \n This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722)\n\n It was discovered that Ring incorrectly handled certain inputs. If a user or\n an automated system were tricked into opening a specially crafted input file,\n a remote attacker could possibly use this issue to cause a denial of service. \n (CVE-2023-27585)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 23.10:\n jami 20230206.0~ds2-1.3ubuntu0.1\n jami-daemon 20230206.0~ds2-1.3ubuntu0.1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6422-2\n https://ubuntu.com/security/notices/USN-6422-1\n CVE-2021-37706, CVE-2023-27585\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/ring/20230206.0~ds2-1.3ubuntu0.1\n\n", "sources": [ { "db": "NVD", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "PACKETSTORM", "id": "166225" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37706", "trust": 3.8 }, { "db": "PACKETSTORM", "id": "166225", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2021-016401", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "169618", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169938", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022022414", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022030601", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0941", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202112-2179", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-37706", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "175025", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "175315", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "PACKETSTORM", "id": "166225" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "id": "VAR-202112-2083", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.75 }, "last_update_date": "2024-08-14T12:52:38.721000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Potential\u00a0integer\u00a0underflow\u00a0upon\u00a0receiving\u00a0STUN\u00a0message", "trust": 0.8, "url": "https://www.asterisk.org/" }, { "title": "PJSIP Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=176822" }, { "title": "Debian CVElist Bug Report Logs: ring: CVE-2021-32686 CVE-2021-37706 CVE-2022-21723 CVE-2022-23608 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 CVE-2022-24754 CVE-2022-24763 CVE-2022-24764 CVE-2022-24793", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4e89fc7b47aa12e94340b2e2db73b906" }, { "title": "Debian Security Advisories: DSA-5285-1 asterisk -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=edc2cf0db8c0593c65c4c82227026727" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-191", "trust": 1.0 }, { "problemtype": "Integer underflow (CWE-191) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/mar/0" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/166225/asterisk-project-security-advisory-ast-2022-004.html" }, { "trust": 1.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37706" }, { "trust": 1.8, "url": "https://github.com/pjsip/pjproject/security/advisories/ghsa-2qpg-f6wf-w984" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/202210-37" }, { "trust": 1.8, "url": "https://www.debian.org/security/2022/dsa-5285" }, { "trust": 1.7, "url": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "trust": 1.0, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169618/gentoo-linux-security-advisory-202210-37.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169938/debian-security-advisory-5285-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022022414" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022030601" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/asterisk-integer-overflow-via-pjproject-stun-message-37712" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0941" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21722" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24763" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39244" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43804" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23608" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24764" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43303" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24793" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43845" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21723" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43302" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-6422-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-27585" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23537" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/191.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004-16.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004.pdf" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004-18.diff" }, { "trust": 0.1, "url": "https://downloads.asterisk.org/pub/security/ast-2022-004.html" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29945" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004.html" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004-19.diff" }, { "trust": 0.1, "url": "https://downloads.digium.com/pub/security/ast-2022-004-16.8.diff" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24754" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39269" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24786" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24792" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32686" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43299" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46837" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43301" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-29017." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43300" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/asterisk" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ring/20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ring/20230206.0~ds1-5ubuntu0.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23547" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ring/20230206.0~ds2-1.3ubuntu0.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-6422-2" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "PACKETSTORM", "id": "166225" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-37706" }, { "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "db": "PACKETSTORM", "id": "166225" }, { "db": "PACKETSTORM", "id": "169618" }, { "db": "PACKETSTORM", "id": "169938" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "db": "NVD", "id": "CVE-2021-37706" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-22T00:00:00", "db": "VULMON", "id": "CVE-2021-37706" }, { "date": "2022-12-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "date": "2022-03-07T16:25:13", "db": "PACKETSTORM", "id": "166225" }, { "date": "2022-11-01T13:21:55", "db": "PACKETSTORM", "id": "169618" }, { "date": "2022-11-18T14:28:10", "db": "PACKETSTORM", "id": "169938" }, { "date": "2023-10-10T14:47:37", "db": "PACKETSTORM", "id": "175025" }, { "date": "2023-10-24T16:01:47", "db": "PACKETSTORM", "id": "175315" }, { "date": "2021-12-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "date": "2021-12-22T18:15:07.487000", "db": "NVD", "id": "CVE-2021-37706" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-18T00:00:00", "db": "VULMON", "id": "CVE-2021-37706" }, { "date": "2022-12-14T05:31:00", "db": "JVNDB", "id": "JVNDB-2021-016401" }, { "date": "2022-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-2179" }, { "date": "2023-08-30T01:15:28.083000", "db": "NVD", "id": "CVE-2021-37706" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "166225" }, { "db": "PACKETSTORM", "id": "175025" }, { "db": "PACKETSTORM", "id": "175315" }, { "db": "CNNVD", "id": "CNNVD-202112-2179" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PJSIP\u00a0 Integer Underflow Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-2179" } ], "trust": 0.6 } }
var-201206-0140
Vulnerability from variot
chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. Asterisk is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to trigger a NULL-pointer dereference and cause a system crash, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201206-05
http://security.gentoo.org/
Severity: Normal Title: Asterisk: Multiple vulnerabilities Date: June 21, 2012 Bugs: #413353, #418189, #418191 ID: 201206-05
Synopsis
Multiple vulnerabilities in Asterisk might allow remote attackers to execute arbitrary code.
Background
Asterisk is an open source telephony engine and toolkit.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/asterisk < 1.8.12.1 >= 1.8.12.1
Description
Multiple vulnerabilities have been found in Asterisk:
- An error in manager.c allows shell access through the MixMonitor application, GetVar, or Status (CVE-2012-2414).
- An error in chan_skinny.c could cause a heap-based buffer overflow (CVE-2012-2415).
- An error in chan_sip.c prevents Asterisk from checking if a channel exists before connected line updates (CVE-2012-2416).
- An error in chan_iax2.c may cause an invalid pointer to be called (CVE-2012-2947).
- chan_skinny.c contains a NULL pointer dereference (CVE-2012-2948).
Impact
A remote attacker could execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Asterisk users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.8.12.1"
References
[ 1 ] CVE-2012-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414 [ 2 ] CVE-2012-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415 [ 3 ] CVE-2012-2416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416 [ 4 ] CVE-2012-2947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947 [ 5 ] CVE-2012-2948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201206-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. When an SCCP client
closes its connection to the server, a pointer in a
structure is set to Null. If the client was not in the
on-hook state at the time the connection was closed, this
pointer is later dereferenced. "Off hook") to crash
the server. Successful exploitation of this vulnerability
would result in termination of the server, causing denial
of service to legitimate users."
Resolution The pointer to the device in the structure is now checked
before it is dereferenced in the channel event callbacks and
message handling functions.
Affected Versions
Product Release Series
Asterisk Open Source 1.8.x All Versions
Asterisk Open Source 10.x All Versions
Certified Asterisk 1.8.11-cert 1.8.11-cert1
Corrected In
Product Release
Asterisk Open Source 1.8.12.1, 10.4.1
Certified Asterisk 1.8.11-cert2
Patches
SVN URL Revision
http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff v1.8
http://downloads.asterisk.org/pub/security/AST-2012-008-10.diff v10
http://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff v1.8.11-cert
Links https://issues.asterisk.org/jira/browse/ASTERISK-19905
Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security
This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2012-008.pdf and
http://downloads.digium.com/pub/security/AST-2012-008.html
Revision History
Date Editor Revisions Made
05/25/2012 Matt Jordan Initial Release
Asterisk Project Security Advisory - AST-2012-008
Copyright (c) 2012 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
Full-Disclosure - We believe in it.
In addition, it was discovered that Asterisk does not set the alwaysauthreject option by default in the SIP channel driver. This allows remote attackers to observe a difference in response behavior and check for the presence of account names. (CVE-2011-2666) System administrators concerned by this user enumerating vulnerability should enable the alwaysauthreject option in the configuration. We do not plan to change the default setting in the stable version (Asterisk 1.6) in order to preserve backwards compatibility.
For the testing distribution (wheezy) and the unstable distribution (sid), this problem has been fixed in version 1:1.8.13.0~dfsg-1.
We recommend that you upgrade your asterisk packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJP15u9AAoJEL97/wQC1SS+Pu0H/0ZPFRSNpL+hJKd7b5FGF6al BZSp51eAC0d2mEFWMml4DAvx6u1gMPzrO9PPNgsEc6gxNyD4Stj+rF54h6X5i5NR ZSlyeQTQ292J18+LdANYWwxQJyzNNthNmYL/2AiR6z2BRnD3ZqHiPbWGv0FV4Vyw rT8fZ7ujp7CQlFGwcqjPxUzBqEq5U2raN2K9BoP6zpu8mHf9WzcmL4KZR/wJxMkf 04McrMttF++gM3atFSSXCWC5Bpj8q0xpr3YIv0dI8+fWPFpevNX2MBM+diS06iNc PUWfCPTy2Psl46dC3J+JeF8TPWE/HCmV98DD54DEv0R1tPUmNm362dtfiutiBbQ= =Wy1e -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Asterisk Two Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA49303
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49303/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49303
RELEASE DATE: 2012-05-30
DISCUSS ADVISORY: http://secunia.com/advisories/49303/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49303/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49303
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).
1) An error in IAX2 channel driver within the "handle_request_update()" function (channels/chan_sip.c) when placing an established call on hold can be exploited to cause a crash via specially crafted packets.
Successful exploitation of this vulnerability requires that the setting mohinterpret=passthrough is set and that the call is placed on hold without a suggested music-on-hold class name.
2) An error in SCCP (Skinny) channel driver (channels/chan_skinny.c) when handling termination of a client's connection can be exploited to cause a crash by closing a connection to the server in certain call states.
The vulnerabilities are reported in versions 1.8.11-cert prior to 1.8.11-cert2, 1.8.x prior to 1.8.12.1, and 10.x prior to 10.4.1.
SOLUTION: Update to a fixed version.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) mgrobecker 2) Christoph Hebeisen
ORIGINAL ADVISORY: http://downloads.asterisk.org/pub/security/AST-2012-007.html http://downloads.asterisk.org/pub/security/AST-2012-008.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.0.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.1.0" }, { "model": "open source", "scope": "eq", "trust": 1.6, "vendor": "asterisk", "version": "10.2.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.2" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "10.4.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.8.0" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11" }, { "model": "asterisk", "scope": "lte", "trust": 1.0, "vendor": "sangoma", "version": "1.8.12.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.6.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.11.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.7.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.9.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.4.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.5" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.10.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.1" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "10.3" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.12.0" }, { "model": "open source", "scope": "eq", "trust": 1.0, "vendor": "asterisk", "version": "1.8.5.0" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.x" }, { "model": "certified asterisk", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "1.8.11-cert" }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.11-cert2" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "1.8.12.1" }, { "model": "asterisk open source", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "10.4.1" }, { "model": "asterisk open source", "scope": "lt", "trust": 0.8, "vendor": "digium", "version": "10.x" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "certified asterisk 1.8.11-cert1", "scope": null, "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.0.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.82" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.42" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.41" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.24" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.3.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.3.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "10.2.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.7.2" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.7.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.4.4" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.4.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.3.3" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.3.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.2.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.11.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.11.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.10.1" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.10.0" }, { "model": "asterisk", "scope": "eq", "trust": 0.3, "vendor": "asterisk", "version": "1.8.1.2" }, { "model": "certified asterisk 1.8.11-cert2", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": null }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "10.4.1" }, { "model": "asterisk", "scope": "ne", "trust": 0.3, "vendor": "asterisk", "version": "1.8.12.1" } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:digium:open_source", "vulnerable": true }, { "cpe22Uri": "cpe:/a:digium:certified_asterisk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Christoph Hebeisen", "sources": [ { "db": "BID", "id": "53723" }, { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.9 }, "cve": "CVE-2012-2948", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2012-2948", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-2948", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-2948", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201205-525", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by closing a connection in off-hook mode. Asterisk is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to trigger a NULL-pointer dereference and cause a system crash, denying service to legitimate users. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201206-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Asterisk: Multiple vulnerabilities\n Date: June 21, 2012\n Bugs: #413353, #418189, #418191\n ID: 201206-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Asterisk might allow remote attackers to\nexecute arbitrary code. \n\nBackground\n==========\n\nAsterisk is an open source telephony engine and toolkit. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/asterisk \u003c 1.8.12.1 \u003e= 1.8.12.1\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in Asterisk:\n\n* An error in manager.c allows shell access through the MixMonitor\n application, GetVar, or Status (CVE-2012-2414). \n* An error in chan_skinny.c could cause a heap-based buffer overflow\n (CVE-2012-2415). \n* An error in chan_sip.c prevents Asterisk from checking if a channel\n exists before connected line updates (CVE-2012-2416). \n* An error in chan_iax2.c may cause an invalid pointer to be called\n (CVE-2012-2947). \n* chan_skinny.c contains a NULL pointer dereference (CVE-2012-2948). \n\nImpact\n======\n\nA remote attacker could execute arbitrary code with the privileges of\nthe process or cause a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/asterisk-1.8.12.1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-2414\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414\n[ 2 ] CVE-2012-2415\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415\n[ 3 ] CVE-2012-2416\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416\n[ 4 ] CVE-2012-2947\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947\n[ 5 ] CVE-2012-2948\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201206-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. When an SCCP client \n closes its connection to the server, a pointer in a \n structure is set to Null. If the client was not in the \n on-hook state at the time the connection was closed, this \n pointer is later dereferenced. \"Off hook\") to crash \n the server. Successful exploitation of this vulnerability \n would result in termination of the server, causing denial \n of service to legitimate users.\" \n\n Resolution The pointer to the device in the structure is now checked \n before it is dereferenced in the channel event callbacks and \n message handling functions. \n\n Affected Versions\n Product Release Series \n Asterisk Open Source 1.8.x All Versions \n Asterisk Open Source 10.x All Versions \n Certified Asterisk 1.8.11-cert 1.8.11-cert1 \n\n Corrected In\n Product Release \n Asterisk Open Source 1.8.12.1, 10.4.1 \n Certified Asterisk 1.8.11-cert2 \n\n Patches \n SVN URL Revision \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-1.8.diff v1.8 \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-10.diff v10 \nhttp://downloads.asterisk.org/pub/security/AST-2012-008-1.8.11-cert.diff v1.8.11-cert \n\n Links https://issues.asterisk.org/jira/browse/ASTERISK-19905 \n\n Asterisk Project Security Advisories are posted at \n http://www.asterisk.org/security \n \n This document may be superseded by later versions; if so, the latest \n version will be posted at \n http://downloads.digium.com/pub/security/AST-2012-008.pdf and \n http://downloads.digium.com/pub/security/AST-2012-008.html \n\n Revision History\n Date Editor Revisions Made \n 05/25/2012 Matt Jordan Initial Release \n\n Asterisk Project Security Advisory - AST-2012-008\n Copyright (c) 2012 Digium, Inc. All Rights Reserved. \n Permission is hereby granted to distribute and publish this advisory in its\n original, unaltered form. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \n\nIn addition, it was discovered that Asterisk does not set the\nalwaysauthreject option by default in the SIP channel driver. This\nallows remote attackers to observe a difference in response behavior\nand check for the presence of account names. (CVE-2011-2666) System\nadministrators concerned by this user enumerating vulnerability should\nenable the alwaysauthreject option in the configuration. We do not\nplan to change the default setting in the stable version\n(Asterisk 1.6) in order to preserve backwards compatibility. \n\nFor the testing distribution (wheezy) and the unstable distribution\n(sid), this problem has been fixed in version 1:1.8.13.0~dfsg-1. \n\nWe recommend that you upgrade your asterisk packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niQEcBAEBAgAGBQJP15u9AAoJEL97/wQC1SS+Pu0H/0ZPFRSNpL+hJKd7b5FGF6al\nBZSp51eAC0d2mEFWMml4DAvx6u1gMPzrO9PPNgsEc6gxNyD4Stj+rF54h6X5i5NR\nZSlyeQTQ292J18+LdANYWwxQJyzNNthNmYL/2AiR6z2BRnD3ZqHiPbWGv0FV4Vyw\nrT8fZ7ujp7CQlFGwcqjPxUzBqEq5U2raN2K9BoP6zpu8mHf9WzcmL4KZR/wJxMkf\n04McrMttF++gM3atFSSXCWC5Bpj8q0xpr3YIv0dI8+fWPFpevNX2MBM+diS06iNc\nPUWfCPTy2Psl46dC3J+JeF8TPWE/HCmV98DD54DEv0R1tPUmNm362dtfiutiBbQ=\n=Wy1e\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nAsterisk Two Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA49303\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49303/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303\n\nRELEASE DATE:\n2012-05-30\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49303/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49303/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Asterisk, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\n1) An error in IAX2 channel driver within the\n\"handle_request_update()\" function (channels/chan_sip.c) when placing\nan established call on hold can be exploited to cause a crash via\nspecially crafted packets. \n\nSuccessful exploitation of this vulnerability requires that the\nsetting mohinterpret=passthrough is set and that the call is placed\non hold without a suggested music-on-hold class name. \n\n2) An error in SCCP (Skinny) channel driver (channels/chan_skinny.c)\nwhen handling termination of a client\u0027s connection can be exploited\nto cause a crash by closing a connection to the server in certain\ncall states. \n\nThe vulnerabilities are reported in versions 1.8.11-cert prior to\n1.8.11-cert2, 1.8.x prior to 1.8.12.1, and 10.x prior to 10.4.1. \n\nSOLUTION:\nUpdate to a fixed version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) mgrobecker\n2) Christoph Hebeisen\n\nORIGINAL ADVISORY:\nhttp://downloads.asterisk.org/pub/security/AST-2012-007.html\nhttp://downloads.asterisk.org/pub/security/AST-2012-008.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-2948" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "BID", "id": "53723" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-2948", "trust": 3.0 }, { "db": "BID", "id": "53723", "trust": 1.9 }, { "db": "SECUNIA", "id": "49303", "trust": 1.7 }, { "db": "SECTRACK", "id": "1027103", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-002590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201205-525", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113979", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113113", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113546", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113124", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "id": "VAR-201206-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T21:02:58.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2012-008", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html" }, { "title": "DSA-2493", "trust": 0.8, "url": "http://www.debian.org/security/2012/dsa-2493" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/53723" }, { "trust": 1.6, "url": "http://secunia.com/advisories/49303" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937" }, { "trust": 1.0, "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html" }, { "trust": 1.0, "url": "http://www.debian.org/security/2012/dsa-2493" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1027103" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2948" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2948" }, { "trust": 0.3, "url": "http://www.asterisk.org/" }, { "trust": 0.3, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008.pdf" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2948" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2947" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2948" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2415" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201206-05.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2414" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2416" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2947" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2414" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2416" }, { "trust": 0.1, "url": "http://www.asterisk.org/security" }, { "trust": 0.1, "url": "https://issues.asterisk.org/jira/browse/asterisk-19905" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-1.8.diff" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-008.html" }, { "trust": 0.1, "url": "http://downloads.digium.com/pub/security/ast-2012-008.pdf" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-10.diff" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-008-1.8.11-cert.diff" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49303" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49303/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://downloads.asterisk.org/pub/security/ast-2012-007.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49303/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "53723" }, { "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "PACKETSTORM", "id": "113546" }, { "db": "PACKETSTORM", "id": "113124" }, { "db": "CNNVD", "id": "CNNVD-201205-525" }, { "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-29T00:00:00", "db": "BID", "id": "53723" }, { "date": "2012-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "date": "2012-06-21T04:39:39", "db": "PACKETSTORM", "id": "113979" }, { "date": "2012-05-29T23:38:21", "db": "PACKETSTORM", "id": "113113" }, { "date": "2012-06-12T20:50:36", "db": "PACKETSTORM", "id": "113546" }, { "date": "2012-05-30T03:42:47", "db": "PACKETSTORM", "id": "113124" }, { "date": "2012-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-525" }, { "date": "2012-06-02T15:55:01.027000", "db": "NVD", "id": "CVE-2012-2948" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-22T00:10:00", "db": "BID", "id": "53723" }, { "date": "2012-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002590" }, { "date": "2012-06-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-525" }, { "date": "2024-11-21T01:40:00.380000", "db": "NVD", "id": "CVE-2012-2948" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "113979" }, { "db": "PACKETSTORM", "id": "113113" }, { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certified Asterisk and Asterisk Open Source Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-525" } ], "trust": 0.6 } }
var-202011-0904
Vulnerability from variot
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-0904", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "13.37.1" }, { "model": "certified asterisk", "scope": "eq", "trust": 1.0, "vendor": "digium", "version": "16.8" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "18.0.0" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "17.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "18.0.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "16.0.0" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "17.8.1" }, { "model": "asterisk", "scope": "lt", "trust": 1.0, "vendor": "sangoma", "version": "16.14.1" }, { "model": "asterisk", "scope": "gte", "trust": 1.0, "vendor": "sangoma", "version": "13.0.0" }, { "model": "asterisk open source", "scope": null, "trust": 0.8, "vendor": "digium", "version": null }, { "model": "certified asterisk", "scope": "eq", "trust": 0.8, "vendor": "digium", "version": "16.8-cert5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "cve": "CVE-2020-28327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-28327", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.6, "id": "CVE-2020-28327", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-28327", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28327", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-28327", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202011-653", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "CNNVD", "id": "CNNVD-202011-653" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling", "sources": [ { "db": "NVD", "id": "CVE-2020-28327" }, { "db": "JVNDB", "id": "JVNDB-2020-013394" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28327", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-013394", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202011-653", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "CNNVD", "id": "CNNVD-202011-653" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "id": "VAR-202011-0904", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.348297215 }, "last_update_date": "2024-11-23T22:40:51.138000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AST-2020-001 Asterisk", "trust": 0.8, "url": "http://downloads.asterisk.org/pub/security/AST-2020-001.html" }, { "title": "Asterisk Open Source Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=132396" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "CNNVD", "id": "CNNVD-202011-653" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-404", "trust": 1.0 }, { "problemtype": "Improper shutdown and release of resources (CWE-404) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://issues.asterisk.org/jira/browse/asterisk-29057" }, { "trust": 1.6, "url": "http://downloads.asterisk.org/pub/security/ast-2020-001.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28327" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "CNNVD", "id": "CNNVD-202011-653" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "db": "CNNVD", "id": "CNNVD-202011-653" }, { "db": "NVD", "id": "CVE-2020-28327" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "date": "2020-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-653" }, { "date": "2020-11-06T19:15:14.080000", "db": "NVD", "id": "CVE-2020-28327" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-29T08:35:00", "db": "JVNDB", "id": "JVNDB-2020-013394" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-653" }, { "date": "2024-11-21T05:22:33.987000", "db": "NVD", "id": "CVE-2020-28327" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-653" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asterisk\u00a0Open\u00a0Source\u00a0 and \u00a0Certified\u00a0Asterisk\u00a0 Improper Resource Shutdown and Release Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013394" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-653" } ], "trust": 0.6 } }