Sangoma Asterisk 20.15.0 Release Candidate 2

CPE Details

Sangoma Asterisk 20.15.0 Release Candidate 2
20.15.0
2025-08-26
16h01 +00:00
2025-08-26
16h01 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:sangoma:asterisk:20.15.0:rc2:*:*:*:*:*:*

Informations

Vendor

sangoma

Product

asterisk

Version

20.15.0

Update

rc2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-57767 2025-08-28 15h33 +00:00 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.
7.5
High