Total vulnerabilities in the database
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
Software | From | Fixed in |
---|---|---|
digium / asterisk | 15.0.0-rc1 | 15.0.0-rc1.x |
digium / asterisk | 15.1.0-rc1 | 15.1.0-rc1.x |
digium / asterisk | 15.1.0-rc2 | 15.1.0-rc2.x |
digium / asterisk | 15.2.0-rc1 | 15.2.0-rc1.x |
digium / asterisk | 15.2.0-rc2 | 15.2.0-rc2.x |
digium / asterisk | 15.1.0 | 15.1.0.x |
digium / asterisk | 15.1.2 | 15.1.2.x |
digium / asterisk | 15.1.3 | 15.1.3.x |
digium / asterisk | 15.1.4 | 15.1.4.x |
digium / asterisk | 15.1.5 | 15.1.5.x |
digium / asterisk | 15.2.1 | 15.2.1.x |
digium / asterisk | 16.0.1-rc1 | 16.0.1-rc1.x |
digium / asterisk | 16.0.0-rc3 | 16.0.0-rc3.x |
digium / asterisk | 16.0.0-rc2 | 16.0.0-rc2.x |
digium / asterisk | 16.0.0 | 16.0.0.x |
digium / asterisk | 15.6.1 | 15.6.1.x |
digium / asterisk | 15.6.0-rc1 | 15.6.0-rc1.x |
digium / asterisk | 15.6.0 | 15.6.0.x |
digium / asterisk | 15.5.0 | 15.5.0.x |
digium / asterisk | 15.5.0-rc1 | 15.5.0-rc1.x |
digium / asterisk | 15.3.0 | 15.3.0.x |
digium / asterisk | 15.3.0-rc1 | 15.3.0-rc1.x |
digium / asterisk | 15.3.0-rc2 | 15.3.0-rc2.x |
digium / asterisk | 15.4.0 | 15.4.0.x |
digium / asterisk | 15.4.0-rc1 | 15.4.0-rc1.x |
digium / asterisk | 15.4.0-rc2 | 15.4.0-rc2.x |
digium / asterisk | 15.4.1 | 15.4.1.x |
digium / asterisk | 15.2.2 | 15.2.2.x |
digium / asterisk | 15.0.0-b1 | 15.0.0-b1.x |
digium / asterisk | 15.0.0 | 15.0.0.x |