asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
SQL Injection

*
  • H
Arbitrary Code Injection

<1:13.14.1~dfsg-2+deb9u5
  • L
Buffer Overflow

*
  • L
Improper Resource Shutdown or Release

*
  • L
CVE-2020-35652

*
  • L
Improper Resource Shutdown or Release

*
  • M
Uncontrolled Recursion

<1:13.14.1~dfsg-2+deb9u6
  • M
Missing Authorization

<1:13.14.1~dfsg-2+deb9u6
  • H
Missing Authorization

<1:13.14.1~dfsg-2+deb9u6
  • H
NULL Pointer Dereference

<1:13.14.1~dfsg-2+deb9u6
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

<1:13.14.1~dfsg-2+deb9u6
  • H
Resource Exhaustion

<1:13.14.1~dfsg-2+deb9u4
  • M
Incorrect Authorization

<1:1.6.2.0~rc3-2
  • H
NULL Pointer Dereference

<1:13.11.2~dfsg-1
  • M
Information Exposure

<1:13.14.1~dfsg-2+deb9u4
  • H
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u4
  • M
CVE-2018-7286

<1:13.14.1~dfsg-2+deb9u4
  • M
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u3
  • H
Incomplete Cleanup

<1:13.14.1~dfsg-2+deb9u3
  • M
Missing Release of Resource after Effective Lifetime

<1:13.14.1~dfsg-2+deb9u3
  • H
Out-of-Bounds

<1:13.14.1~dfsg-2+deb9u3
  • H
Information Exposure

<1:13.14.1~dfsg-2+deb9u2
  • H
Information Exposure

<1:13.14.1~dfsg-2+deb9u1
  • C
OS Command Injection

<1:13.14.1~dfsg-2+deb9u1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:13.14.1~dfsg-2
  • H
Resource Management Errors

<1:13.11.2~dfsg-1
  • H
Out-of-Bounds

<1:13.14.1~dfsg-1
  • M
Improper Authorization

<1:13.13.1~dfsg-1
  • M
Integer Underflow

<1:13.7.2~dfsg-1
  • M
CVE-2016-2232

<1:13.7.2~dfsg-1
  • M
Cryptographic Issues

<1:13.7.2~dfsg-1
  • L
Resource Management Errors

<1:13.1.0~dfsg-1.1
  • M
CVE-2014-9374

<1:13.1.0~dfsg-1
  • M
Improper Data Handling

<1:11.12.1~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Resource Management Errors

<1:13.1.0~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • L
CVE-2014-4046

<1:11.10.2~dfsg-1
  • L
CVE-2014-4047

<1:11.10.2~dfsg-1
  • H
Improper Input Validation

<1:11.8.1~dfsg-1
  • L
Improper Input Validation

<1:11.8.1~dfsg-1
  • M
Out-of-Bounds

<1:11.7.0~dfsg-1
  • M
Out-of-Bounds

<1:11.5.1~dfsg-1
  • M
Improper Input Validation

<1:11.5.1~dfsg-1
  • L
Information Exposure

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • H
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • M
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • M
Access Restriction Bypass

<1:1.8.13.1~dfsg-1
  • H
CVE-2012-2186

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • L
Improper Access Control

<1:1.8.13.0~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.0~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
Improper Authentication

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
CVE-2012-0885

<1:1.8.8.2~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Improper Input Validation

<1:1.8.7.1~dfsg-1
  • M
Improper Input Validation

<1:13.7.2~dfsg-1
  • M
Configuration

<1:1.8.3.3-1
  • M
CVE-2011-2665

<1:1.8.4.3-1
  • M
Out-of-Bounds

<1:1.8.4.3-1
  • M
Information Exposure

<1:1.8.4.4~dfsg-1
  • M
Improper Input Validation

<1:1.8.4.3-1
  • M
CVE-2011-2216

<1:1.8.4.2-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • H
Improper Input Validation

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
CVE-2011-1175

<1:1.8.3.3-1
  • M
Out-of-Bounds

<1:1.8.3.3-1
  • M
Out-of-bounds Write

<1:1.6.2.9-2+squeeze1
  • L
Access Restriction Bypass

<1:1.6.2.6-1
  • M
CVE-2010-0685

<1:1.6.2.6-1
  • M
Improper Input Validation

<1:1.6.2.2-1
  • M
CVE-2009-4055

<1:1.6.2.0~rc7-1
  • M
Information Exposure

<1:1.6.2.0~rc6-1
  • L
CVE-2008-7220

<1:1.6.2.0~rc3-1
  • H
Out-of-Bounds

<1:1.6.2.0~dfsg~beta3-1
  • H
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Information Exposure

<1:1.6.1.0~dfsg~rc3-1
  • M
Improper Authentication

<1:1.4.0~dfsg-1
  • L
Information Exposure

<1:1.6.1.0~dfsg-1
  • H
Improper Authentication

<1:1.4.21.2~dfsg-1
  • H
Resource Management Errors

<1:1.4.21.2~dfsg-1
  • M
Improper Input Validation

<1.4
  • M
Improper Authentication

<1:1.4.19.1~dfsg-1
  • M
Configuration

<1:1.4.19.1~dfsg-1
  • M
Out-of-Bounds

<1:1.4.18.1~dfsg-1
  • L
Credentials Management

<1:1.4.19.1~dfsg-1
  • M
Use of Externally-Controlled Format String

<1:1.4.18.1~dfsg-1
  • M
Access Restriction Bypass

<1:1.4.18.1~dfsg-1
  • M
Resource Management Errors

<1:1.4.17~dfsg-1
  • L
Improper Authentication

<1:1.4.16.2~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
Out-of-Bounds

<1:1.4.13~dfsg-1
  • M
CVE-2007-4455

<1:1.4.11~dfsg-1
  • L
CVE-2007-4280

<1:1.4.10~dfsg-1
  • H
CVE-2007-4103

<1:1.4.9~dfsg-1
  • M
CVE-2007-3763

<1:1.4.8~dfsg-1
  • H
CVE-2007-3762

<1:1.4.8~dfsg-1
  • M
CVE-2007-3765

<1:1.4.8~dfsg-1
  • M
CVE-2007-3764

<1:1.4.8~dfsg-1
  • L
CVE-2007-2488

<1:1.4.5~dfsg-1
  • L
CVE-2007-2383

<1:1.6.2.0~rc3-1
  • H
CVE-2007-2293

<1:1.4.3~dfsg-1
  • M
CVE-2007-2297

<1:1.4.2~dfsg-1
  • L
CVE-2007-2294

<1:1.4.3~dfsg-1
  • L
CVE-2007-1595

<1:1.4.0~dfsg-1
  • M
CVE-2007-1561

<1:1.4.2~dfsg-5
  • M
CVE-2007-1306

<1:1.2.16~dfsg-1
  • M
CVE-2006-5445

<1:1.2.13~dfsg-1
  • M
CVE-2006-5444

<1:1.2.13~dfsg-1
  • M
CVE-2006-4346

<1:1.2.11.dfsg-1
  • M
CVE-2006-4345

<1:1.2.11.dfsg-1
  • H
Out-of-Bounds

<1:1.2.10.dfsg-2
  • M
CVE-2006-1827

<1:1.2.7.1.dfsg-1
  • M
CVE-2005-3559

<1:1.2.7.1.dfsg-2
  • L
CVE-2005-2081

<1:1.0.9.dfsg-1
  • H
CVE-2003-0779

<0.7.0
  • H
CVE-2003-0761

<0.5.0