Vulnerabilities > Digium > Asterisk > 13.0.0

DATE CVE VULNERABILITY TITLE RISK
2016-02-22 CVE-2016-2232 Denial of Service vulnerability in Multiple Asterisk Products
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
network
low complexity
digium
4.0
2015-04-10 CVE-2015-3008 Cryptographic Issues vulnerability in Digium Asterisk and Certified Asterisk
Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
network
digium CWE-310
4.3
2015-02-09 CVE-2015-1558 Resource Management Errors vulnerability in Digium Asterisk
Asterisk Open Source 12.x before 12.8.1 and 13.x before 13.1.1, when using the PJSIP channel driver, does not properly reclaim RTP ports, which allows remote authenticated users to cause a denial of service (file descriptor consumption) via an SDP offer containing only incompatible codecs.
network
digium CWE-399
3.5
2014-12-12 CVE-2014-9374 Denial of Service vulnerability in Multiple Asterisk Products WebSocket Server
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
network
low complexity
digium
5.0
2014-11-24 CVE-2014-8417 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk and Certified Asterisk
ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDGE dialplan function or (2) execute arbitrary system commands via a crafted ConfbridgeStartRecord AMI action.
network
low complexity
digium CWE-264
6.5
2014-11-24 CVE-2014-8416 Improper Input Validation vulnerability in Digium Asterisk
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up.
network
low complexity
digium CWE-20
5.0
2014-11-24 CVE-2014-8415 Improper Input Validation vulnerability in Digium Asterisk
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing.
network
low complexity
digium CWE-20
5.0
2014-11-24 CVE-2014-8413 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk
The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.
network
low complexity
digium CWE-264
7.5
2014-11-24 CVE-2014-8412 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk and Certified Asterisk
The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
network
low complexity
digium CWE-264
5.0