Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
digium vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2014-8415
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x prior to 12.7.1 and 13.x prior to 13.0.1 allows remote malicious users to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer...
Digium Asterisk
5
CVSSv2
CVE-2018-7285
A NULL pointer access issue exists in Asterisk 15.x up to and including 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired one...
Digium Asterisk
5
CVSSv2
CVE-2019-15639
main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote malicious user to send a specific RTP packet during a call and cause a crash in a specific scenario.
Digium Asterisk
4.3
CVSSv2
CVE-2020-35776
A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote malicious user to crash Asterisk by deliberately misusing SIP 181 responses.
Digium Asterisk
4
CVSSv2
CVE-2020-35652
An issue exists in res_pjsip_diversion.c in Sangoma Asterisk prior to 13.38.0, 14.x up to and including 16.x prior to 16.15.0, 17.x prior to 17.9.0, and 18.x prior to 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or w...
Digium Asterisk
7.5
CVSSv2
CVE-2014-8413
The res_pjsip_acl module in Asterisk Open Source 12.x prior to 12.7.1 and 13.x prior to 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote malicious users to bypass intended PJSIP ACL rules.
Digium Asterisk
5
CVSSv2
CVE-2014-8416
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x prior to 12.7.1 and 13.x prior to 13.0.1, when using the res_pjsip_refer module, allows remote malicious users to cause a denial of service (crash) via an in-dialog INVITE with Replaces message,...
Digium Asterisk
4
CVSSv2
CVE-2019-15297
res_pjsip_t38 in Sangoma Asterisk 15.x prior to 15.7.4 and 16.x prior to 16.5.1 allows an malicious user to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.
Digium Asterisk
4
CVSSv2
CVE-2019-7251
An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and previous versions and 16.1.1 and previous versions allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation.
Digium Asterisk
5
CVSSv2
CVE-2021-32558
An issue exists in Sangoma Asterisk 13.x prior to 13.38.3, 16.x prior to 16.19.1, 17.x prior to 17.9.4, and 18.x prior to 18.5.1, and Certified Asterisk prior to 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur...
Digium Asterisk
Digium Certified Asterisk 16.8
Debian Debian Linux 9.0
Debian Debian Linux 11.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »