asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.asterisk.org|asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
NULL Pointer Dereference

[,18.26.3)[20.00.0,20.15.1)[20.7-cert1-pre1,20.7-cert7)[21.00.0,21.10.1)[22.00.0,22.5.1)
  • H
Improper Neutralization

[,18.9-cert14)[18.10.0,18.26.2)[20.0.0,20.7-cert5)[20.8.0,20.14.1)[21.0.0,21.9.1)[22.0.0,22.4.1)
  • M
Command Injection

[,18.9-cert14)[18.10.0,18.26.2)[20.0.0,20.7-cert5)[20.8.0,20.14.1)[21.0.0,21.9.1)[22.0.0,22.4.1)
  • M
Improper Privilege Management

[,22.3.0-rc1)
  • H
Directory Traversal

[,18.26.1)[20.0.0-rc1,20.11.1)[21.0.0-pre1,21.6.1)[22.0.0-pre1,22.1.1)
  • M
Unchecked Return Value

[,18.24.3)[20.0.0,20.9.3)[21.0.0,21.4.3)[,18.9-cert12)[20.7-cert1-rc1,20.7-cert2)
  • M
Privilege Defined With Unsafe Actions

[,18.24.2)[19.0.0-rc1,20.9.2)[21.0.0-pre1,21.4.2)
  • M
Incorrect Implementation of Authentication Algorithm

[18.23.0,18.23.1)[20.8.0,20.8.1)[21.3.0,21.3.1)
  • H
Classic Buffer Overflow

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • H
Race Condition

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • M
Path Traversal

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • H
Buffer Underwrite (Buffer Underflow)

[16.0.0,16.29.1)[18.0.0,18.15.1)[19.0.0,19.7.1)[20.0.0,20.0.1)
  • M
Use After Free

[,21.0.0-pre1)
  • M
Directory Traversal

[16.0.0,16.29.1)[18.0.0,18.15.1)[19.0.0,19.7.1)[20.0.0,20.0.1)
  • H
Denial of Service (DoS)

[,16.16.1)[17.0.0,17.9.2)[18.0.0,18.2.1)
  • H
Improper Input Validation

[16.0.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Server-side Request Forgery (SSRF)

[16.15.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Denial of Service (DoS)

[16.15.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Out-of-Bounds

[13.0.0-beta1,13.19.2)[14.0.0,14.7.6)[15.0.0,15.2.2)
  • H
Resource Management Errors

[,11.6)[11.23.0,11.23.1)[13.0,13.8)
  • M
Improper Input Validation

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • H
Improper Input Validation

[13.0.0,13.18.5)[14.0.0,14.7.5)[15.0.0,15.1.5)
  • H
Arbitrary Code Execution

[,0.5.0)
  • H
Out-of-Bounds

[13.0.0,13.18.1)[14.0.0,14.7.1)[15.0.0,15.1.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • M
Denial of Service (DoS)

[1.2.0-beta1,1.2.37)[1.4.0-beta1,1.4.27.1)[1.6.0-beta1,1.6.1.11)
  • H
Out-of-bounds Read

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • H
Access Restriction Bypass

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • H
Unrestricted Upload of File with Dangerous Type

[,1.6.0-beta1)
  • M
Denial of Service (DoS)

[13.0.0,13.37.1)[16.0.0,16.14.1)[17.0.0,17.8.1)[18.0.0,18.0.1)
  • M
Improper Input Validation

[,12.1.1)
  • M
Information Exposure

[1.2.0-rc1,1.2.33)[1.4.0-beta1,1.4.25.1)[1.6.0-beta1,1.6.1.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • M
Improper Authorization

[,11.6)[11.25.0,11.25.1)[13.0,13.8)[13.13.0,13.13.1)[14.2.0,14.2.1)
  • M
Out-of-Bounds

[,1.8.11.1)[10.3.0,10.3.1)
  • H
Access Restriction Bypass

[13.0.0,13.29.2)[16.0.0,16.6.2)[17.0.0,17.0.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • H
Improper Input Validation

[,13.17.1)[14.6.0,14.6.1)
  • M
Out-of-Bounds

[13.0.0,13.18.1)[14.0.0,14.7.1)[15.0.0,15.1.1)
  • M
Denial of Service (DoS)

[,10.5.1)
  • M
Out-of-Bounds

[1.4.0,1.4.44)[1.6.0,1.6.2.23)[1.8.0,1.8.10.1)[10.0.0,10.2.1)
  • H
Arbitrary Code Execution

[1.0-rc1,1.2.11)
  • H
Access Restriction Bypass

[,1.8.15.1)[10.0.0-beta1,10.7.1)
  • H
Information Exposure

[,11.6)[11.25.0,11.25.2)[13.0,13.13)[13.17.0,13.17.1)[14.6.0,14.6.1)
  • M
NULL Pointer Dereference

[13.0.0,13.27.1)[15.0.0,15.7.3)[16.0.0,16.4.1)
  • M
Information Exposure

[,1.4.43)[1.6.2.0,1.6.2.21)[1.8.7.0,1.8.7.2)
  • H
SQL Injection

[1.4.0,1.4.15)
  • M
Cryptographic Issues

[,1.8.28)[1.8.32.0,1.8.32.3)[11.0,11.6)[11.17.0,11.17.1)[12.8.0,12.8.2)[13.0,13.1)[13.3.0,13.3.2)
  • H
Arbitrary Code Execution

[,0.5.0)
  • H
Memory Allocation with Excessive Size Value

[1.2.0-beta1,1.2.34)[1.4.0-beta1,1.4.26.1)[1.6.0-beta1,1.6.1.4)
  • H
Arbitrary Code Execution

[,1.0.12)[1.2.0,1.2.13)
  • M
Improper Input Validation

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Improper Input Validation

[,1.8.7.1)
  • H
Denial of Service (DoS)

[,0.6.0)[1.2.0,1.2.23)[1.4.0,1.4.9)
  • H
Improper Authentication

[,1.2.0.1)[1.2.0,1.2.30)[1.4.21.0,1.4.21.2)
  • M
Denial of Service (DoS)

[13.0.0,13.38.2)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Improper Data Handling

[,11.6)[11.12.0,11.12.1)[12.5.0,12.5.1)
  • M
Resource Management Errors

[,1.6.1.24)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.2)
  • C
Arbitrary Command Injection

[,11.6)[11.25.0,11.25.2)[13.0,13.13)[13.17.0,13.17.1)[14.6.0,14.6.1)
  • H
NULL Pointer Dereference

[13.0.0,13.29.2)
  • M
Missing Authentication for Critical Function

[,1.2.40)
  • M
Resource Management Errors

[,1.6.1.2)
  • M
Denial of Service (DoS)

[,12.3.1)
  • M
Information Exposure

[1.2.0-beta1,1.2.35)[1.4.0-beta1,1.4.26.3)[1.6.0-beta1,1.6.1.9)
  • H
Denial of Service (DoS)

[,1.2.18)[1.4.0,1.4.3)
  • L
Improper Input Validation

[,1.8.15)[1.8.26.0,1.8.26.1)[11.0,11.6)[11.8.0,11.8.1)[12.1.0,12.1.1)
  • M
Exposure of Private Personal Information to an Unauthorized Actor

[1.4.0-beta1,1.4.41.2)[1.6.2.0-beta1,1.6.2.18.2)[1.8.0-beta1,1.8.4.4)
  • M
CVE-2020-35652

[,13.38.0)[14.0,16.15.0)[17.0,17.9.0)[18.0,18.1.0)
  • M
Information Exposure

[13.0.0,13.21.1)(14.0.0,14.7.7)[15.0.0,15.4.1)
  • H
Allocation of Resources Without Limits or Throttling

[13.0.0,13.23.1)[14.0.0,14.7.8)[15.0.0,15.6.1)
  • M
Information Exposure

[,1.6.2.21)[1.8.7.0,1.8.7.2)
  • M
Improper Authentication

[,1.2.28)[1.4.0-beta1,1.4.19.1)
  • M
Information Exposure

[,1.8.15)[1.8.20.0,1.8.20.2)[10.12.0,10.12.2)[10.12.0,10.12.2)[11.2.0,11.2.2)
  • H
Access Restriction Bypass

[1.8.0,1.8.32.1)[11.0.0,11.14.1)[12.0.0,12.7.1)
  • H
Out-of-Bounds

[13.0.0-rc1,13.14.1)[14.0.0-rc1,14.3.1)
  • M
Out-of-Bounds

[,1.6.2.24)[1.8.11.0,1.8.11.1)[10.3.0,10.3.1)
  • M
Arbitrary Code Execution

[,1.2.7)
  • H
Information Exposure

[,11.6)[11.25.0,11.25.3)[13.0,13.13)[13.17.0,13.17.2)[14.6.0,14.6.2)
  • M
Denial of Service (DoS)

[1.4.5,1.4.12)
  • M
Improper Authentication

[,1.2.26)[1.4.0,1.4.16)
  • H
NULL Pointer Dereference

[13.10.0,13.11.1)
  • M
Denial of Service (DoS)

[,1.8.4.2)
  • H
Resource Management Errors

[,1.2.0.1)[1.2.0,1.2.30)[1.4.21.0,1.4.21.2)
  • M
Improper Input Validation

[1.2.0-beta,1.2.29)
  • H
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.2)
  • H
Out-of-Bounds

[,11.2.2)
  • M
Denial of Service (DoS)

[,16.19.1)[18.5.0,18.5.1)
  • M
Out-of-Bounds

[,1.8.15)[1.8.24.0,1.8.24.1)[10.12.0,10.12.4)[10.12.0,10.12.4)[11.0,11.2)[11.6.0,11.6.1)
  • H
Out-of-Bounds

[1.2.0-beta1,1.2.35)[1.4.0-beta1,1.4.26.2)[1.6.0-beta1,1.6.1.6)
  • H
Directory Traversal

[1.0.0,1.2.11)
  • M
Buffer Overflow

[13.0.0,13.38.2)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.0)
  • M
Out-of-Bounds

[,1.8.15)[1.8.23.0,1.8.23.1)[11.0,11.2)[11.5.0,11.5.1)
  • M
SQL Injection

[,1.2.25)[1.4.0-beta1,1.4.15)
  • M
Improper Authentication

[15.0,15.4.1)
  • M
Out-of-Bounds

[,1.8.19.1)
  • L
Resource Management Errors

[,12.8.1)[13.1.0,13.1.1)
  • M
Denial of Service (DoS)

[,1.6.1.23)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.1)
  • H
Arbitrary Code Injection

[13.0.0,13.38.3)[16.0.0,16.19.1)[17.0.0,17.9.4)[18.0.0,18.15.1)
  • M
Remote Code Execution (RCE)

[,11.6)[11.10.0,11.10.1)[12.3.0,12.3.1)
  • H
Allocation of Resources Without Limits or Throttling

[13.0.0-beta1,13.18.3)[14.0.0-beta1,14.7.3)[15.0.0-beta1,15.1.3)
  • M
NULL Pointer Dereference

[15.0.0,15.7.4)[16.0.0,16.5.1)
  • H
Out-of-Bounds

[,13.13.1)[14.2.0,14.2.1)
  • H
Improper Input Validation

[,1.8.15)[1.8.26.0,1.8.26.1)[11.0,11.6)[11.8.0,11.8.1)[12.1.0,12.1.1)
  • M
Denial of Service (DoS)

[,1.8.8.2)[10.0.0,10.0.1)
  • M
Buffer Overflow

[13.0.0-rc1,13.37.1)[16.0.0-rc1,16.14.1)[17.0.0-rc1,17.8.1)[18.0.0-rc1,18.0.1)
  • H
Improper Input Validation

[13.0.0,13.28.1)[16.0.0,16.5.1)
  • H
Incorrect Authorization

[1.6.1,1.6.1.8)
  • H
Improper Input Validation

[,1.4.40.1)[1.6.1.0,1.6.1.25)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.3)
  • M
Directory Traversal

[0.1.0,1.2.0-beta2)
  • M
Information Exposure

[,1.4.41.2)[1.6.2.0,1.6.2.18)[1.8.4.0,1.8.4.4)
  • M
Denial of Service (DoS)

[,11.6)[11.14.0,11.14.2)[12.7.0,12.7.2)[13.0.0,13.0.2)
  • M
Out-of-Bounds

[,1.8.19.1)
  • M
Improper Input Validation

[,12.5.1)
  • M
Resource Management Errors

[,11.14.1)
  • M
Out-of-Bounds

[,1.6.2.18)[1.8.4.0,1.8.4.3)
  • H
Denial of Service (DoS)

[,1.2.16)[1.4.0,1.4.1)
  • M
Integer Overflow or Wraparound

[15.0.0,15.7.2)[16.0.0,16.2.1)
  • M
Resource Management Errors

[,1.8.11)[1.8.13.0,1.8.13.1)[10.5.0,10.5.2)[10.5.0,10.5.2)
  • M
Out-of-bounds Write

[1.2.0-beta1,1.4.39.1)[1.6.0-beta1,1.6.2.16.1)[1.8.0-beta1,1.8.2.2)
  • M
Improper Authentication

[,1.6.2.24)[1.8.11.0,1.8.11.1)[10.3.0,10.3.1)
  • M
Access Restriction Bypass

[11.0.0,11.14.1)[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Improper Input Validation

[,1.4.41.1)[1.6.2.0,1.6.2.18)[1.8.4.0,1.8.4.3)
  • H
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.2)
  • M
Improper Input Validation

[,1.6.0.22)[1.6.1.0,1.6.1.14)[1.6.2.0,1.6.2.2)
  • M
Access Restriction Bypass

[13.0.0,13.29.2)[16.0.0,16.6.2)[17.0.0,17.0.1)
  • H
SQL Injection

[,0.7.0)
  • H
CVE-2021-26717

[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Out-of-Bounds

[,1.4.39.2)[1.6.1.0,1.6.1.22)[1.6.2.0,1.6.2.16)[1.8.2.0,1.8.2.4)
  • M
Denial of Service (DoS)

[,1.8.15)[1.8.28.0,1.8.28.1)[11.0,11.6)[11.10.0,11.10.1)[12.3.0,12.3.1)
  • H
Denial of Service (DoS)

[,1.2.18)[1.4.0,1.4.3)
  • M
Improper Input Validation

[,1.8.15)[1.8.23.0,1.8.23.1)[10.12.0,10.12.3)[10.12.0,10.12.3)[11.0,11.2)[11.5.0,11.5.1)
  • H
Denial of Service (DoS)

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • M
Integer Underflow

[,11.6)[11.21.0,11.21.1)[13.0,13.1)[13.7.0,13.7.1)
  • M
Out-of-Bounds

[13.0.0,13.18.4)[14.0.0,14.7.4)[15.0.0,15.1.4)
  • M
Denial of Service (DoS)

[,11.6)[11.21.0,11.21.1)[13.0,13.1)[13.7.0,13.7.1)
  • H
Arbitrary Code Execution

[,1.4.3)
  • H
Out-of-Bounds

[,1.8.10.1)[10.2.0,10.2.1)
  • M
Arbitrary Code Execution

[,1.0.8)
  • M
Improper Handling of Values

[,15.2.2)
  • H
Out-of-Bounds

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • M
Improper Data Handling

[,13.18)[14.0.0,14.7.6)[15.0.0,15.2.2)
  • L
Improper Access Control

[,1.8.11)[1.8.12.0,1.8.12.1)[10.4.0,10.4.1)
  • H
Insufficiently Protected Credentials

[,1.2.13)
  • H
NULL Pointer Dereference

[15.0.0,15.2.2)
  • H
Out-of-Bounds

[,15.6.2)[16.0.0,16.0.1)
  • M
Out-of-Bounds

[13.0.0,13.27.0)[15.0.0,15.7.2)[16.0.0,16.4.0)
  • M
Resource Management Errors

[,1.4.40.1)[1.6.1.0,1.6.1.25)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.3)
  • M
Out-of-Bounds

[,1.4.12.1)
  • H
Access Restriction Bypass

[13.0.0,14.0)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Access Restriction Bypass

[,1.8.11)[1.8.15.0,1.8.15.1)[10.7.0,10.7.1)[10.7.0,10.7.1)
  • H
Denial of Service (DoS)

[,1.2.13)
  • M
Out-of-bounds Write

[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0.0,18.2.1)
  • M
NULL Pointer Dereference

[1.8.0-beta1,1.8.12.1)[10.0.0-beta1,10.4.1)
  • M
Denial of Service (DoS)

[,1.8.4.3)
  • M
Denial of Service (DoS)

[,12.3.1)
  • L
Improper Input Validation

[,1.6.0.6)
  • M
Resource Management Errors

[,1.8.11)[1.8.13.0,1.8.13.1)[10.5.0,10.5.2)[10.5.0,10.5.2)
  • M
Improper Authentication

[b.2.3.4,1.2.30.4)
  • H
Out-of-Bounds

[,1.0.11)[1.2.0,1.2.9)
  • M
Access Restriction Bypass

[1.8.0,1.8.32.1)[11.0.0,11.14.1)[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Asymmetric Resource Consumption (Amplification)

[1.2.0-beta1,1.2.28)[1.4.0-beta1,1.4.19.1)
  • L
Improper Input Validation

[,12.1.0)
  • H
Weak Authentication

[,1.2.27)[1.4.0-beta1,1.4.19-rc3)
  • M
Access Restriction Bypass

[,1.6.0.25)[1.6.1.0,1.6.1.17)[1.6.2.0,1.6.2.5)
  • M
Out-of-Bounds

[,1.8.15)[1.8.20.0,1.8.20.2)[10.12.0,10.12.2)[10.12.0,10.12.2)[11.2.0,11.2.2)