asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
SQL Injection

*
  • H
Arbitrary Code Injection

<1:13.14.1~dfsg-2+deb9u5
  • L
Buffer Overflow

*
  • L
Improper Resource Shutdown or Release

*
  • L
CVE-2020-35652

*
  • L
Improper Resource Shutdown or Release

*
  • M
Uncontrolled Recursion

<1:13.14.1~dfsg-2+deb9u6
  • M
Missing Authorization

<1:13.14.1~dfsg-2+deb9u6
  • H
Missing Authorization

<1:13.14.1~dfsg-2+deb9u6
  • H
NULL Pointer Dereference

<1:13.14.1~dfsg-2+deb9u6
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

<1:13.14.1~dfsg-2+deb9u6
  • H
Resource Exhaustion

<1:13.14.1~dfsg-2+deb9u4
  • M
Incorrect Authorization

<1:1.6.2.0~rc3-2
  • H
NULL Pointer Dereference

<1:13.11.2~dfsg-1
  • M
Information Exposure

<1:13.14.1~dfsg-2+deb9u4
  • H
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u4
  • M
CVE-2018-7286

<1:13.14.1~dfsg-2+deb9u4
  • M
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u3
  • H
Incomplete Cleanup

<1:13.14.1~dfsg-2+deb9u3
  • M
Missing Release of Resource after Effective Lifetime

<1:13.14.1~dfsg-2+deb9u3
  • H
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u3
  • H
Information Exposure

<1:13.14.1~dfsg-2+deb9u2
  • C
OS Command Injection

<1:13.14.1~dfsg-2+deb9u1
  • H
Information Exposure

<1:13.14.1~dfsg-2+deb9u1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:13.14.1~dfsg-2
  • H
Resource Management Errors

<1:13.11.2~dfsg-1
  • H
Out-of-Bounds

<1:13.14.1~dfsg-1
  • M
Improper Authorization

<1:13.13.1~dfsg-1
  • M
Integer Underflow

<1:13.7.2~dfsg-1
  • M
CVE-2016-2232

<1:13.7.2~dfsg-1
  • M
Cryptographic Issues

<1:13.7.2~dfsg-1
  • L
Resource Management Errors

<1:13.1.0~dfsg-1.1
  • M
CVE-2014-9374

<1:13.1.0~dfsg-1
  • M
Improper Data Handling

<1:11.12.1~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • M
Resource Management Errors

<1:13.1.0~dfsg-1
  • L
CVE-2014-4047

<1:11.10.2~dfsg-1
  • L
CVE-2014-4046

<1:11.10.2~dfsg-1
  • L
Improper Input Validation

<1:11.8.1~dfsg-1
  • H
Improper Input Validation

<1:11.8.1~dfsg-1
  • M
Out-of-Bounds

<1:11.7.0~dfsg-1
  • M
Improper Input Validation

<1:11.5.1~dfsg-1
  • M
Out-of-Bounds

<1:11.5.1~dfsg-1
  • L
Information Exposure

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • H
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • M
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • H
CVE-2012-2186

<1:1.8.13.1~dfsg-1
  • M
Access Restriction Bypass

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.0~dfsg-1
  • L
Improper Access Control

<1:1.8.13.0~dfsg-1
  • M
Improper Authentication

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
CVE-2012-0885

<1:1.8.8.2~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Improper Input Validation

<1:1.8.7.1~dfsg-1
  • M
Improper Input Validation

<1:13.7.2~dfsg-1
  • M
Out-of-Bounds

<1:1.8.4.3-1
  • M
Improper Input Validation

<1:1.8.4.3-1
  • M
Configuration

<1:1.8.3.3-1
  • M
CVE-2011-2665

<1:1.8.4.3-1
  • M
Information Exposure

<1:1.8.4.4~dfsg-1
  • M
CVE-2011-2216

<1:1.8.4.2-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • H
Improper Input Validation

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
CVE-2011-1175

<1:1.8.3.3-1
  • M
Out-of-Bounds

<1:1.8.3.3-1
  • M
Out-of-bounds Write

<1:1.6.2.9-2+squeeze1
  • L
Access Restriction Bypass

<1:1.6.2.6-1
  • M
CVE-2010-0685

<1:1.6.2.6-1
  • M
Improper Input Validation

<1:1.6.2.2-1
  • M
CVE-2009-4055

<1:1.6.2.0~rc7-1
  • M
Information Exposure

<1:1.6.2.0~rc6-1
  • L
CVE-2008-7220

<1:1.6.2.0~rc3-1
  • H
Out-of-Bounds

<1:1.6.2.0~dfsg~beta3-1
  • H
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Information Exposure

<1:1.6.1.0~dfsg~rc3-1
  • M
Improper Authentication

<1:1.4.0~dfsg-1
  • L
Information Exposure

<1:1.6.1.0~dfsg-1
  • H
Improper Authentication

<1:1.4.21.2~dfsg-1
  • H
Resource Management Errors

<1:1.4.21.2~dfsg-1
  • M
Improper Input Validation

<1.4
  • M
Improper Authentication

<1:1.4.19.1~dfsg-1
  • M
Configuration

<1:1.4.19.1~dfsg-1
  • M
Out-of-Bounds

<1:1.4.18.1~dfsg-1
  • L
Credentials Management

<1:1.4.19.1~dfsg-1
  • M
Use of Externally-Controlled Format String

<1:1.4.18.1~dfsg-1
  • M
Access Restriction Bypass

<1:1.4.18.1~dfsg-1
  • M
Resource Management Errors

<1:1.4.17~dfsg-1
  • L
Improper Authentication

<1:1.4.16.2~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
Out-of-Bounds

<1:1.4.13~dfsg-1
  • M
CVE-2007-4455

<1:1.4.11~dfsg-1
  • L
CVE-2007-4280

<1:1.4.10~dfsg-1
  • H
CVE-2007-4103

<1:1.4.9~dfsg-1
  • M
CVE-2007-3765

<1:1.4.8~dfsg-1
  • M
CVE-2007-3764

<1:1.4.8~dfsg-1
  • M
CVE-2007-3763

<1:1.4.8~dfsg-1
  • H
CVE-2007-3762

<1:1.4.8~dfsg-1
  • L
CVE-2007-2488

<1:1.4.5~dfsg-1
  • L
CVE-2007-2383

<1:1.6.2.0~rc3-1
  • M
CVE-2007-2297

<1:1.4.2~dfsg-1
  • L
CVE-2007-2294

<1:1.4.3~dfsg-1
  • H
CVE-2007-2293

<1:1.4.3~dfsg-1
  • L
CVE-2007-1595

<1:1.4.0~dfsg-1
  • M
CVE-2007-1561

<1:1.4.2~dfsg-5
  • M
CVE-2007-1306

<1:1.2.16~dfsg-1
  • M
CVE-2006-5445

<1:1.2.13~dfsg-1
  • M
CVE-2006-5444

<1:1.2.13~dfsg-1
  • M
CVE-2006-4345

<1:1.2.11.dfsg-1
  • M
CVE-2006-4346

<1:1.2.11.dfsg-1
  • H
Out-of-Bounds

<1:1.2.10.dfsg-2
  • M
CVE-2006-1827

<1:1.2.7.1.dfsg-1
  • M
CVE-2005-3559

<1:1.2.7.1.dfsg-2
  • L
CVE-2005-2081

<1:1.0.9.dfsg-1
  • H
CVE-2003-0779

<0.7.0
  • H
CVE-2003-0761

<0.5.0