asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-42491

<1:20.9.3~dfsg+~cs6.14.60671435-1
  • H
CVE-2024-42365

<1:20.9.3~dfsg+~cs6.14.60671435-1
  • H
Directory Traversal

<1:20.5.1~dfsg+~cs6.13.40431414-1
  • H
Buffer Overflow

<1:20.8.1~dfsg+~cs6.14.40431414-1
  • M
Race Condition

<1:20.5.1~dfsg+~cs6.13.40431414-1
  • C
Use After Free

<1:20.8.1~dfsg+~cs6.14.40431414-1
  • H
Buffer Overflow

<1:20.4.0~dfsg+~cs6.13.40431414-1
  • C
Heap-based Buffer Overflow

<1:20.4.0~dfsg+~cs6.13.40431414-1
  • C
Heap-based Buffer Overflow

<1:20.4.0~dfsg+~cs6.13.40431414-1
  • M
Use After Free

<1:20.0.1~dfsg+~cs6.12.40431414-1
  • H
Out-of-bounds Write

<1:20.0.1~dfsg+~cs6.12.40431414-1
  • M
Directory Traversal

<1:20.0.1~dfsg+~cs6.12.40431414-1
  • C
CVE-2022-39269

<1:20.3.0~dfsg+~cs6.13.40431413-1
  • C
Buffer Overflow

<1:20.0.1~dfsg+~cs6.12.40431414-1
  • M
NULL Pointer Dereference

<1:18.9.0~dfsg+~cs6.10.40431411-1
  • C
Buffer Overflow

<1:20.0.1~dfsg+~cs6.12.40431414-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1
  • H
Buffer Overflow

<1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1
  • C
Out-of-bounds Read

<1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1
  • C
SQL Injection

<1:18.11.2~dfsg+~cs6.10.40431413-1
  • C
Server-Side Request Forgery (SSRF)

<1:18.11.2~dfsg+~cs6.10.40431413-1
  • H
Resource Exhaustion

<1:18.11.2~dfsg+~cs6.10.40431413-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1
  • H
Buffer Overflow

<1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1
  • C
Use After Free

<1:18.10.1~dfsg+~cs6.10.40431411-1
  • C
Stack-based Buffer Overflow

<1:18.11.1~dfsg+~cs6.10.40431413-1
  • C
Buffer Overflow

<1:18.11.1~dfsg+~cs6.10.40431413-1
  • C
Stack-based Buffer Overflow

<1:18.11.1~dfsg+~cs6.10.40431413-1
  • C
Out-of-bounds Read

<1:18.11.1~dfsg+~cs6.10.40431413-1
  • C
Stack-based Buffer Overflow

<1:18.11.1~dfsg+~cs6.10.40431413-1
  • C
Out-of-bounds Read

<1:18.10.1~dfsg+~cs6.10.40431411-1
  • C
Out-of-bounds Read

<1:18.12.0~dfsg+~cs6.12.40431413-1
  • C
Out-of-bounds Read

<1:18.12.0~dfsg+~cs6.12.40431413-1
  • C
Integer Underflow

<1:18.10.1~dfsg+~cs6.10.40431411-1
  • H
Out-of-bounds Read

<1:18.12.0~dfsg+~cs6.12.40431413-1
  • H
Arbitrary Code Injection

<1:16.16.1~dfsg-2
  • M
Race Condition

<1:16.16.1~dfsg-2
  • M
Buffer Overflow

<1:16.16.1~dfsg-1
  • M
Improper Resource Shutdown or Release

<1:16.16.1~dfsg-1
  • H
CVE-2021-26717

<1:16.16.1~dfsg-1
  • M
CVE-2020-35652

<1:16.15.1~dfsg-1
  • M
Improper Resource Shutdown or Release

<1:16.15.0~dfsg-1
  • M
Uncontrolled Recursion

<1:16.15.0~dfsg-1
  • M
Missing Authorization

<1:16.10.0~dfsg-1
  • H
Missing Authorization

<1:16.10.0~dfsg-1
  • H
NULL Pointer Dereference

<1:16.1.1~dfsg-1
  • L
NULL Pointer Dereference

<1:16.10.0~dfsg-1
  • M
Out-of-Bounds

<1:16.2.1~dfsg-2
  • L
NULL Pointer Dereference

<1:16.2.1~dfsg-2
  • M
Integer Overflow or Wraparound

<1:16.2.1~dfsg-1
  • H
Resource Exhaustion

<1:13.23.1~dfsg-1
  • M
Incorrect Authorization

<1:1.6.2.0~rc3-2
  • H
NULL Pointer Dereference

<1:13.11.2~dfsg-1
  • M
Information Exposure

<1:13.22.0~dfsg-1
  • H
Out-of-Bounds

<1:13.20.0~dfsg-1
  • M
CVE-2018-7286

<1:13.20.0~dfsg-1
  • H
Improper Input Validation

<1:13.18.5~dfsg-1
  • M
Out-of-Bounds

<1:13.18.5~dfsg-1
  • H
Incomplete Cleanup

<1:13.18.3~dfsg-1
  • M
Missing Release of Resource after Effective Lifetime

<1:13.18.1~dfsg-1
  • H
Out-of-Bounds

<1:13.18.1~dfsg-1
  • H
Information Exposure

<1:13.17.2~dfsg-1
  • H
Improper Input Validation

<1:13.17.1~dfsg-1
  • H
Information Exposure

<1:13.17.1~dfsg-1
  • C
OS Command Injection

<1:13.17.1~dfsg-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:13.14.1~dfsg-2
  • H
Resource Management Errors

<1:13.11.2~dfsg-1
  • H
Out-of-Bounds

<1:13.14.1~dfsg-1
  • M
Improper Authorization

<1:13.13.1~dfsg-1
  • M
Integer Underflow

<1:13.7.2~dfsg-1
  • M
CVE-2016-2232

<1:13.7.2~dfsg-1
  • M
Cryptographic Issues

<1:13.7.2~dfsg-1
  • L
Resource Management Errors

<1:13.1.0~dfsg-1.1
  • M
CVE-2014-9374

<1:13.1.0~dfsg-1
  • M
Improper Data Handling

<1:11.12.1~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • H
Access Restriction Bypass

<1:13.1.0~dfsg-1
  • M
Improper Input Validation

<1:13.1.0~dfsg-1
  • M
Resource Management Errors

<1:13.1.0~dfsg-1
  • L
CVE-2014-4047

<1:11.10.2~dfsg-1
  • L
CVE-2014-4046

<1:11.10.2~dfsg-1
  • L
Improper Input Validation

<1:11.8.1~dfsg-1
  • H
Improper Input Validation

<1:11.8.1~dfsg-1
  • M
Out-of-Bounds

<1:11.7.0~dfsg-1
  • M
Improper Input Validation

<1:11.5.1~dfsg-1
  • M
Out-of-Bounds

<1:11.5.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • L
Information Exposure

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.13.1~dfsg-2
  • M
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • H
Out-of-Bounds

<1:1.8.10.0~dfsg-1
  • M
Access Restriction Bypass

<1:1.8.13.1~dfsg-1
  • H
CVE-2012-2186

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.1~dfsg-1
  • L
Improper Access Control

<1:1.8.13.0~dfsg-1
  • M
Resource Management Errors

<1:1.8.13.0~dfsg-1
  • M
Improper Authentication

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
Out-of-Bounds

<1:1.8.11.1~dfsg-1
  • M
CVE-2012-0885

<1:1.8.8.2~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Information Exposure

<1:1.8.8.0~dfsg-1
  • M
Improper Input Validation

<1:1.8.7.1~dfsg-1
  • M
Improper Input Validation

<1:13.7.2~dfsg-1
  • M
CVE-2011-2665

<1:1.8.4.3-1
  • M
Improper Input Validation

<1:1.8.4.3-1
  • M
Information Exposure

<1:1.8.4.4~dfsg-1
  • M
Configuration

<1:1.8.3.3-1
  • M
Out-of-Bounds

<1:1.8.4.3-1
  • M
CVE-2011-2216

<1:1.8.4.2-1
  • H
Improper Input Validation

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
CVE-2011-1175

<1:1.8.3.3-1
  • M
Resource Management Errors

<1:1.8.3.3-1
  • M
Out-of-Bounds

<1:1.8.3.3-1
  • M
Out-of-bounds Write

<1:1.6.2.9-2+squeeze1
  • L
Access Restriction Bypass

<1:1.6.2.6-1
  • M
CVE-2010-0685

<1:1.6.2.6-1
  • M
Improper Input Validation

<1:1.6.2.2-1
  • M
CVE-2009-4055

<1:1.6.2.0~rc7-1
  • M
Information Exposure

<1:1.6.2.0~rc6-1
  • L
CVE-2008-7220

<1:1.6.2.0~rc3-1
  • H
Out-of-Bounds

<1:1.6.2.0~dfsg~beta3-1
  • H
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Resource Management Errors

<1:1.6.2.0~dfsg~rc1-1
  • L
Information Exposure

<1:1.6.1.0~dfsg~rc3-1
  • M
Improper Authentication

<1:1.4.0~dfsg-1
  • L
Information Exposure

<1:1.6.1.0~dfsg-1
  • H
Improper Authentication

<1:1.4.21.2~dfsg-1
  • H
Resource Management Errors

<1:1.4.21.2~dfsg-1
  • M
Improper Input Validation

<1.4
  • M
Improper Authentication

<1:1.4.19.1~dfsg-1
  • M
Configuration

<1:1.4.19.1~dfsg-1
  • L
Credentials Management

<1:1.4.19.1~dfsg-1
  • M
Out-of-Bounds

<1:1.4.18.1~dfsg-1
  • M
Access Restriction Bypass

<1:1.4.18.1~dfsg-1
  • M
Use of Externally-Controlled Format String

<1:1.4.18.1~dfsg-1
  • M
Resource Management Errors

<1:1.4.17~dfsg-1
  • L
Improper Authentication

<1:1.4.16.2~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
SQL Injection

<1:1.4.15~dfsg-1
  • M
Out-of-Bounds

<1:1.4.13~dfsg-1
  • M
CVE-2007-4455

<1:1.4.11~dfsg-1
  • L
CVE-2007-4280

<1:1.4.10~dfsg-1
  • H
CVE-2007-4103

<1:1.4.9~dfsg-1
  • M
CVE-2007-3765

<1:1.4.8~dfsg-1
  • M
CVE-2007-3763

<1:1.4.8~dfsg-1
  • M
CVE-2007-3764

<1:1.4.8~dfsg-1
  • H
CVE-2007-3762

<1:1.4.8~dfsg-1
  • L
CVE-2007-2488

<1:1.4.5~dfsg-1
  • L
CVE-2007-2383

<1:1.6.2.0~rc3-1
  • H
CVE-2007-2293

<1:1.4.3~dfsg-1
  • M
CVE-2007-2297

<1:1.4.2~dfsg-1
  • L
CVE-2007-2294

<1:1.4.3~dfsg-1
  • L
CVE-2007-1595

<1:1.4.0~dfsg-1
  • M
CVE-2007-1561

<1:1.4.2~dfsg-5
  • M
CVE-2007-1306

<1:1.2.16~dfsg-1
  • M
CVE-2006-5444

<1:1.2.13~dfsg-1
  • M
CVE-2006-5445

<1:1.2.13~dfsg-1
  • M
CVE-2006-4345

<1:1.2.11.dfsg-1
  • M
CVE-2006-4346

<1:1.2.11.dfsg-1
  • H
Out-of-Bounds

<1:1.2.10.dfsg-2
  • M
CVE-2006-1827

<1:1.2.7.1.dfsg-1
  • M
CVE-2005-3559

<1:1.2.7.1.dfsg-2
  • L
CVE-2005-2081

<1:1.0.9.dfsg-1
  • H
CVE-2003-0779

<0.7.0
  • H
CVE-2003-0761

<0.5.0