ALT-PU-2020-2313-1
Closed vulnerabilities
BDU:2022-01086
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код
BDU:2022-02186
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02209
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-15297
res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.
- http://downloads.asterisk.org/pub/security/AST-2019-004.html
- http://downloads.asterisk.org/pub/security/AST-2019-004.html
- http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html
- http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html
- http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html
- http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html
- 20210304 AST-2021-006: Crash when negotiating T.38 with a zero port
- 20210304 AST-2021-006: Crash when negotiating T.38 with a zero port
Modified: 2024-11-21
CVE-2019-15639
main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
- http://downloads.asterisk.org/pub/security/AST-2019-005.html
- http://downloads.asterisk.org/pub/security/AST-2019-005.html
- http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html
- http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html
Modified: 2024-11-21
CVE-2019-18610
An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
- http://downloads.asterisk.org/pub/security/AST-2019-007.html
- http://downloads.asterisk.org/pub/security/AST-2019-007.html
- [debian-lts-announce] 20191130 [SECURITY] [DLA 2017-1] asterisk security update
- [debian-lts-announce] 20191130 [SECURITY] [DLA 2017-1] asterisk security update
- [debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update
- [debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update
- https://www.asterisk.org/downloads/security-advisories
- https://www.asterisk.org/downloads/security-advisories
Modified: 2024-11-21
CVE-2019-18790
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.
- http://downloads.asterisk.org/pub/security/AST-2019-006.html
- http://downloads.asterisk.org/pub/security/AST-2019-006.html
- [debian-lts-announce] 20191130 [SECURITY] [DLA 2017-1] asterisk security update
- [debian-lts-announce] 20191130 [SECURITY] [DLA 2017-1] asterisk security update
- [debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update
- [debian-lts-announce] 20220403 [SECURITY] [DLA 2969-1] asterisk security update
- https://www.asterisk.org/downloads/security-advisories
- https://www.asterisk.org/downloads/security-advisories
Modified: 2024-11-21
CVE-2021-37706
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-23608
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-26651
An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.
- http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html
- http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html
- https://downloads.asterisk.org/pub/security/
- https://downloads.asterisk.org/pub/security/
- https://downloads.asterisk.org/pub/security/AST-2022-003.html
- https://downloads.asterisk.org/pub/security/AST-2022-003.html
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-37325
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash.
- https://downloads.asterisk.org/pub/security/AST-2022-007.html
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- DSA-5358
- https://downloads.asterisk.org/pub/security/AST-2022-007.html
- DSA-5358
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
Modified: 2024-11-21
CVE-2022-42705
A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.
- https://downloads.asterisk.org/pub/security/AST-2022-008.html
- https://downloads.asterisk.org/pub/security/AST-2022-008.html
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- DSA-5358
- DSA-5358