Search Results (Refine Search)
- CPE Product Version: cpe:/a:digium:certified_asterisk:13.1:cert2
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2019-13161 |
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration). Published: July 12, 2019; 4:15:11 PM -0400 |
V3.1: 5.3 MEDIUM V2.0: 3.5 LOW |
CVE-2016-2316 |
chan_sip in Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote attackers to cause a denial of service (file descriptor consumption) via vectors related to large retransmit timeout values. Published: February 22, 2016; 10:59:02 AM -0500 |
V3.0: 5.9 MEDIUM V2.0: 7.1 HIGH |
CVE-2016-2232 |
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost. Published: February 22, 2016; 10:59:01 AM -0500 |
V3.0: 6.5 MEDIUM V2.0: 4.0 MEDIUM |