Sangoma Asterisk 15.1.4

CPE Details

Sangoma Asterisk 15.1.4
15.1.4
2024-08-15
10h44 +00:00
2024-08-15
10h44 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:sangoma:asterisk:15.1.4:*:*:*:*:*:*:*

Informations

Vendor

sangoma

Product

asterisk

Version

15.1.4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-57767 2025-08-28 15h33 +00:00 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.
7.5
High
CVE-2018-12228 2018-06-12 02h00 +00:00 An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.
6.5
Medium