This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Digium First view 2014-04-18
Product Certified Asterisk Last view 2019-07-12
Version 1.8.3.0 Type Application
Update rc2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:digium:certified_asterisk

Activity : Overall

Related : CVE

  Date Alert Description
5.3 2019-07-12 CVE-2019-13161

An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).

6.5 2018-02-21 CVE-2018-7286

An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of SIP INVITE messages on a TCP or TLS connection and then suddenly closing the connection.

7.5 2018-02-21 CVE-2018-7284

A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.

5.9 2017-12-13 CVE-2017-17664

A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack.

7.5 2017-12-01 CVE-2017-17090

An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.

8.8 2017-04-10 CVE-2017-7617

Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action.

4.3 2015-04-10 CVE-2015-3008

Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

3.5 2014-04-18 CVE-2014-2287

channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.

7.5 2014-04-18 CVE-2014-2286

main/http.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.x before 1.8.15-cert5 and 11.6 before 11.6-cert2, allows remote attackers to cause a denial of service (stack consumption) and possibly execute arbitrary code via an HTTP request with a large number of Cookie headers.

CWE : Common Weakness Enumeration

%idName
37% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25% (2) CWE-20 Improper Input Validation
12% (1) CWE-476 NULL Pointer Dereference
12% (1) CWE-459 Incomplete Cleanup
12% (1) CWE-310 Cryptographic Issues

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0078 Multiple Asterisk Products Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0059871
2014-A-0035 Multiple Vulnerabilities in Asterisk Products
Severity: Category I - VMSKEY: V0046183

Snort® IPS/IDS

Date Description
2019-09-19 Digium Asterisk multiple malformed Accept headers denial of service attempt
RuleID : 51087 - Type : PROTOCOL-VOIP - Revision : 1
2019-09-19 Digium Asterisk multiple malformed Accept headers denial of service attempt
RuleID : 51086 - Type : PROTOCOL-VOIP - Revision : 1
2015-10-14 Digium Asterisk TLS Certificate Common Name null byte validation bypass attempt
RuleID : 36025 - Type : SERVER-OTHER - Revision : 3
2014-05-01 Digium Asterisk cookie stack buffer overflow attempt
RuleID : 30293 - Type : SERVER-WEBAPP - Revision : 4
2014-05-01 Digium Asterisk cookie stack buffer overflow attempt
RuleID : 30292 - Type : SERVER-WEBAPP - Revision : 4
2014-05-01 Digium Asterisk cookie stack buffer overflow attempt
RuleID : 30291 - Type : SERVER-WEBAPP - Revision : 4

Nessus® Vulnerability Scanner

id Description
2018-10-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4320.nasl - Type: ACT_GATHER_INFO
2018-03-02 Name: A telephony application running on the remote host is affected by a Subscribe...
File: asterisk_ast_2018_002-005.nasl - Type: ACT_GATHER_INFO
2018-03-02 Name: A telephony application running on the remote host is affected by multiple vu...
File: asterisk_ast_2018_001-006.nasl - Type: ACT_GATHER_INFO
2018-02-23 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_933654ce17b811e890b8001999f8d30b.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-66e9367f7e.nasl - Type: ACT_GATHER_INFO
2018-01-02 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4076.nasl - Type: ACT_GATHER_INFO
2018-01-02 Name: The remote Debian host is missing a security update.
File: debian_DLA-1225.nasl - Type: ACT_GATHER_INFO
2017-12-28 Name: The remote Fedora host is missing a security update.
File: fedora_2017-38fbcdffc3.nasl - Type: ACT_GATHER_INFO
2017-12-06 Name: A telephony application running on the remote host is affected by a memory ex...
File: asterisk_ast_2017_013.nasl - Type: ACT_GATHER_INFO
2017-12-04 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_e91cf90cd6dd11e79d10001999f8d30b.nasl - Type: ACT_GATHER_INFO
2017-04-13 Name: A telephony application running on the remote host is affected by a remote co...
File: asterisk_ast_2017_001.nasl - Type: ACT_GATHER_INFO
2017-01-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-781.nasl - Type: ACT_GATHER_INFO
2016-10-26 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3700.nasl - Type: ACT_GATHER_INFO
2016-05-04 Name: The remote Debian host is missing a security update.
File: debian_DLA-455.nasl - Type: ACT_GATHER_INFO
2015-07-22 Name: The remote Fedora host is missing a security update.
File: fedora_2015-5948.nasl - Type: ACT_GATHER_INFO
2015-04-28 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-206.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: A telephony application running on the remote host is affected by a certifica...
File: asterisk_ast_2015_003.nasl - Type: ACT_GATHER_INFO
2015-04-09 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_5fee3f02de3711e4b7c3001999f8d30b.nasl - Type: ACT_GATHER_INFO
2014-05-05 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201405-05.nasl - Type: ACT_GATHER_INFO
2014-04-17 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-078.nasl - Type: ACT_GATHER_INFO
2014-03-22 Name: The remote Fedora host is missing a security update.
File: fedora_2014-3779.nasl - Type: ACT_GATHER_INFO
2014-03-22 Name: The remote Fedora host is missing a security update.
File: fedora_2014-3762.nasl - Type: ACT_GATHER_INFO
2014-03-14 Name: A telephony application running on the remote host is affected by a denial of...
File: asterisk_ast_2014_002.nasl - Type: ACT_GATHER_INFO
2014-03-14 Name: A telephony application running on the remote host is affected by a stack ove...
File: asterisk_ast_2014_001.nasl - Type: ACT_GATHER_INFO
2014-03-12 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_03159886a8a311e38f360025905a4771.nasl - Type: ACT_GATHER_INFO