Total vulnerabilities in the database
A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.
Software | From | Fixed in |
---|---|---|
digium / certified_asterisk | 16.8-cert1-rc1 | 16.8-cert1-rc1.x |
digium / certified_asterisk | 16.8-cert1-rc2 | 16.8-cert1-rc2.x |
digium / certified_asterisk | 16.8-cert1-rc3 | 16.8-cert1-rc3.x |
digium / certified_asterisk | 16.8-cert1-rc4 | 16.8-cert1-rc4.x |
digium / certified_asterisk | 16.8-cert2 | 16.8-cert2.x |
digium / certified_asterisk | 16.8-cert3 | 16.8-cert3.x |
digium / certified_asterisk | 16.8-cert4 | 16.8-cert4.x |
digium / certified_asterisk | 16.8-cert4-rc1 | 16.8-cert4-rc1.x |
digium / certified_asterisk | 16.8-cert4-rc2 | 16.8-cert4-rc2.x |
digium / certified_asterisk | 16.8-cert4-rc3 | 16.8-cert4-rc3.x |
digium / certified_asterisk | 16.8-cert4-rc4 | 16.8-cert4-rc4.x |
digium / certified_asterisk | 16.8 | 16.8.x |
digium / certified_asterisk | 16.8-cert5 | 16.8-cert5.x |
digium / asterisk | 16.0.0 | 16.16.1 |
digium / asterisk | 17.0.0 | 17.9.2 |
digium / asterisk | 18.0.0 | 18.2.1 |