Show filters
170 Total Results
Displaying 31-40 of 170
Sort by:
Attacker Value
Unknown
CVE-2009-3723
Disclosure Date: October 29, 2019 (last updated August 16, 2024)
asterisk allows calls on prohibited networks
0
Attacker Value
Unknown
CVE-2019-15297
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.
0
Attacker Value
Unknown
CVE-2019-15639
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
0
Attacker Value
Unknown
CVE-2019-13161
Disclosure Date: July 12, 2019 (last updated November 27, 2024)
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
0
Attacker Value
Unknown
CVE-2019-12827
Disclosure Date: July 12, 2019 (last updated November 27, 2024)
Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message.
0
Attacker Value
Unknown
CVE-2019-18976
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.
0
Attacker Value
Unknown
CVE-2016-7550
Disclosure Date: May 23, 2019 (last updated November 27, 2024)
asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote).
0
Attacker Value
Unknown
CVE-2019-7251
Disclosure Date: March 28, 2019 (last updated November 27, 2024)
An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation.
0
Attacker Value
Unknown
CVE-2018-19278
Disclosure Date: November 14, 2018 (last updated November 27, 2024)
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
0
Attacker Value
Unknown
CVE-2018-17281
Disclosure Date: September 24, 2018 (last updated November 27, 2024)
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
0