asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Missing Authorization

<1:11.13.1~dfsg-2+deb8u7
  • H
Missing Authorization

<1:11.13.1~dfsg-2+deb8u7
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

<1:11.13.1~dfsg-2+deb8u6
  • H
Incorrect Authorization

<1:1.6.2.0~rc3-2
  • H
Incomplete Cleanup

<1:11.13.1~dfsg-2+deb8u5
  • H
Information Exposure

<1:11.13.1~dfsg-2+deb8u4
  • C
OS Command Injection

<1:11.13.1~dfsg-2+deb8u3
  • H
Information Exposure

<1:11.13.1~dfsg-2+deb8u3
  • H
Resource Management Errors

<1:11.13.1~dfsg-2+deb8u1
  • M
Improper Authorization

<1:11.13.1~dfsg-2+deb8u2
  • M
Integer Underflow

<1:11.13.1~dfsg-2+deb8u1
  • M
CVE-2016-2232

<1:11.13.1~dfsg-2+deb8u1
  • M
Cryptographic Issues

<1:11.13.1~dfsg-2+deb8u1
  • M
CVE-2014-9374

<1:11.13.1~dfsg-2
  • M
Improper Data Handling

<1:11.12.1~dfsg-1
  • H
Access Restriction Bypass

<1:11.13.1~dfsg-2
  • M
Access Restriction Bypass

<1:11.13.1~dfsg-2
  • M
Resource Management Errors

<1:11.13.1~dfsg-2
  • M
Access Restriction Bypass

<1:11.13.1~dfsg-2
  • M
CVE-2014-4046

<1:11.10.2~dfsg-1
  • M
CVE-2014-4047

<1:11.10.2~dfsg-1
  • L
Improper Input Validation

<1:11.8.1~dfsg-1
  • H
Improper Input Validation

<1:11.8.1~dfsg-1
  • M
Out-of-Bounds

<1:11.7.0~dfsg-1
  • M
Improper Input Validation

<1:11.5.1~dfsg-1
  • M
Out-of-Bounds

<1:11.5.1~dfsg-1
  • M
Information Exposure

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • H
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • H
CVE-2012-2186

<1:1.8.13.1~dfsg-1
  • M
Access Restriction Bypass

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • L
Improper Access Control

<1:1.8.13.0~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.0~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
Improper Authentication

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
CVE-2012-0885

<1:1.8.8.2~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Improper Input Validation

<1:1.8.7.1~dfsg-1
  • M
Improper Input Validation

<1:11.13.1~dfsg-2+deb8u1
  • M
CVE-2011-2665

<1:1.8.4.3-1
  • M
Information Exposure

<1:1.8.4.4~dfsg-1
  • M
Out-of-Bounds

<1:1.8.4.3-1
  • M
Improper Input Validation

<1:1.8.4.3-1
  • M
Configuration

<1:1.8.3.3-1
  • M
CVE-2011-2216

<1:1.8.4.2-1
  • H
Improper Input Validation

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
CVE-2011-1175

<1:1.8.3.3-1
  • M
Out-of-Bounds

<1:1.8.3.3-1
  • M
Out-of-bounds Write

<1:1.6.2.9-2+squeeze1
  • M
Access Restriction Bypass

<1:1.6.2.6-1
  • M
CVE-2010-0685

<1:1.6.2.6-1
  • M
Improper Input Validation

<1:1.6.2.2-1
  • M
CVE-2009-4055

<1:1.6.2.0~rc7-1
  • M
Information Exposure

<1:1.6.2.0~rc6-1
  • H
CVE-2008-7220

<1:1.6.2.0~rc3-1
  • H
Out-of-Bounds

<1:1.6.2.0~dfsg~beta3-1
  • H
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • M
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • M
Information Exposure

<1:1.6.1.0~dfsg~rc3-1
  • M
Improper Authentication

<1:1.4.0~dfsg-1
  • L
Information Exposure

<1:1.6.1.0~dfsg-1
  • H
Improper Authentication

<1:1.4.21.2~dfsg-1
  • H
Resource Management Errors

<1:1.4.21.2~dfsg-1
  • M
Improper Input Validation

<1.4
  • M
Improper Authentication

<1:1.4.19.1~dfsg-1
  • M
Configuration

<1:1.4.19.1~dfsg-1
  • H
Out-of-Bounds

<1:1.4.18.1~dfsg-1
  • H
Credentials Management

<1:1.4.19.1~dfsg-1
  • H
Access Restriction Bypass

<1:1.4.18.1~dfsg-1
  • M
Use of Externally-Controlled Format String

<1:1.4.18.1~dfsg-1
  • M
Resource Management Errors

<1:1.4.17~dfsg-1
  • M
Improper Authentication

<1:1.4.16.2~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • H
SQL Injection

<1:1.4.15~dfsg-1
  • M
Out-of-Bounds

<1:1.4.13~dfsg-1
  • M
CVE-2007-4455

<1:1.4.11~dfsg-1
  • L
CVE-2007-4280

<1:1.4.10~dfsg-1
  • H
CVE-2007-4103

<1:1.4.9~dfsg-1
  • H
CVE-2007-3762

<1:1.4.8~dfsg-1
  • M
CVE-2007-3764

<1:1.4.8~dfsg-1
  • M
CVE-2007-3763

<1:1.4.8~dfsg-1
  • M
CVE-2007-3765

<1:1.4.8~dfsg-1
  • C
CVE-2007-2488

<1:1.4.5~dfsg-1
  • M
CVE-2007-2383

<1:1.6.2.0~rc3-1
  • H
CVE-2007-2294

<1:1.4.3~dfsg-1
  • H
CVE-2007-2293

<1:1.4.3~dfsg-1
  • H
CVE-2007-2297

<1:1.4.2~dfsg-1
  • H
CVE-2007-1595

<1:1.4.0~dfsg-1
  • H
CVE-2007-1561

<1:1.4.2~dfsg-5
  • H
CVE-2007-1306

<1:1.2.16~dfsg-1
  • H
CVE-2006-5445

<1:1.2.13~dfsg-1
  • H
CVE-2006-5444

<1:1.2.13~dfsg-1
  • H
CVE-2006-4346

<1:1.2.11.dfsg-1
  • H
CVE-2006-4345

<1:1.2.11.dfsg-1
  • H
Out-of-Bounds

<1:1.2.10.dfsg-2
  • M
CVE-2006-1827

<1:1.2.7.1.dfsg-1
  • M
CVE-2005-3559

<1:1.2.7.1.dfsg-2
  • M
CVE-2005-2081

<1:1.0.9.dfsg-1
  • H
CVE-2003-0779

<0.7.0
  • H
CVE-2003-0761

<0.5.0