asterisk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.asterisk.org|asterisk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

[0,)
  • H
Directory Traversal

[0,)
  • M
Unchecked Return Value

[,18.24.3)[20.0.0,20.9.3)[21.0.0,21.4.3)[,18.9-cert12)[20.7-cert1-rc1,20.7-cert2)
  • M
Privilege Defined With Unsafe Actions

[,18.24.2)[19.0.0-rc1,20.9.2)[21.0.0-pre1,21.4.2)[cetified/1.8.6-cert1,certified-18.9-cert11)[certified-20.7-cert1-rc1,certified-20.7-cert2)
  • M
Incorrect Implementation of Authentication Algorithm

[18.23.0,18.23.1)[20.8.0,20.8.1)[21.3.0,21.3.1)
  • H
Classic Buffer Overflow

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • H
Race Condition

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • M
Path Traversal

[,certified-18.9-cert6)[18.20.0,18.20.1)[20.0.0,20.5.1)[21.0.0,21.0.1)
  • H
Buffer Underwrite (Buffer Underflow)

[16.0.0,16.29.1)[18.0.0,18.15.1)[19.0.0,19.7.1)[20.0.0,20.0.1)
  • M
Use After Free

[0,)
  • M
Directory Traversal

[16.0.0,16.29.1)[18.0.0,18.15.1)[19.0.0,19.7.1)[20.0.0,20.0.1)
  • H
Denial of Service (DoS)

[,16.16.1)[17.0.0,17.9.2)[18.0.0,18.2.1)
  • H
Improper Input Validation

[16.0.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Server-side Request Forgery (SSRF)

[16.15.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Denial of Service (DoS)

[16.15.0,16.25.2)[18.0.0,18.11.2)[19.0.0,19.3.2)
  • H
Out-of-Bounds

[,13.18][13.18,13.19.2)[14.0.0,14.7.6)[15.0.0,15.2.2)
  • H
Resource Management Errors

[,11.6)[11.23.0,11.23.1)[13.0,13.8)
  • M
Improper Input Validation

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • H
Improper Input Validation

[13.0.0,13.18.5)[14.0.0,14.7.5)[15.0.0,15.1.5)
  • H
Arbitrary Code Execution

[,1.2.13]
  • H
Out-of-Bounds

[13.0.0,13.18.1)[14.0.0,14.7.1)[15.0.0,15.1.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • M
Denial of Service (DoS)

[,1.2.37)[1.3.0.0,1.3.0.6)[1.4.27.0,1.4.27.1)[1.6.0.0,1.6.0.19)[1.6.1.0,1.6.1.11)
  • H
Out-of-bounds Read

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • H
Access Restriction Bypass

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • H
CVE-2007-1595

[,1.2.13]
  • M
Denial of Service (DoS)

[13.0.0,13.37.1)[16.0.0,16.14.1)[17.0.0,17.8.1)[18.0.0,18.0.1)
  • M
Improper Input Validation

[,12.1.1)
  • M
Information Exposure

[,b.2.5.2][b.2.5.2,c.1.0][c.1.0,1.2.30.4][1.2.30.4,1.4.23][1.4.23,1.6.0.3.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • M
Improper Authorization

[,11.6)[11.25.0,11.25.1)[13.0,13.8)[13.13.0,13.13.1)[14.2.0,14.2.1)
  • M
Out-of-Bounds

[,1.8.11.1)[10.3.0,10.3.1)
  • H
Access Restriction Bypass

[13.0.0,13.29.2)[16.0.0,16.6.2)[17.0.0,17.0.1)
  • M
Denial of Service (DoS)

[,0.5.0)
  • H
Improper Input Validation

[,13.17.1)[14.6.0,14.6.1)
  • M
Out-of-Bounds

[13.0.0,13.18.1)[14.0.0,14.7.1)[15.0.0,15.1.1)
  • M
Denial of Service (DoS)

[,10.5.1)
  • M
Out-of-Bounds

[1.4.0,1.4.44)[1.6.0,1.6.2.23)[1.8.0,1.8.10.1)[10.0.0,10.2.1)
  • H
Arbitrary Code Execution

[1.0_rc1,1.2.10]
  • H
Access Restriction Bypass

[,1.8.11][1.8.11,1.8.15.0][1.8.15.0,10.7.1)
  • H
Information Exposure

[,11.6)[11.25.0,11.25.2)[13.0,13.13)[13.17.0,13.17.1)[14.6.0,14.6.1)
  • M
NULL Pointer Dereference

[13.0.0,13.27.1)[15.0.0,15.7.3)[16.0.0,16.4.1)
  • M
Information Exposure

[,1.4.43)[1.6.2.0,1.6.2.21)[1.8.7.0,1.8.7.2)
  • H
SQL Injection

[1.4.0,1.4.15)
  • M
Cryptographic Issues

[,1.8.28)[1.8.32.0,1.8.32.3)[11.0,11.6)[11.17.0,11.17.1)[12.8.0,12.8.2)[13.0,13.1)[13.3.0,13.3.2)
  • H
Arbitrary Code Execution

[,0.5.0)
  • H
Resource Management Errors

[,1.2.34)[1.3.0.0,1.3.0.3)[1.4.26.0,1.4.26.1)[1.6.0.0,1.6.0.12)[1.6.1.0,1.6.1.4)
  • H
Arbitrary Code Execution

[,1.0.12)[1.2.0,1.2.13)
  • M
Improper Input Validation

[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Improper Input Validation

[,1.8.7.1)
  • H
Denial of Service (DoS)

[,0.6.0)[1.2.0,1.2.23)[1.4.0,1.4.9)
  • H
Improper Authentication

[,1.2.0.1)[1.2.0,1.2.30)[1.4.21.0,1.4.21.2)
  • M
Denial of Service (DoS)

[13.0.0,13.38.2)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Improper Data Handling

[,11.6)[11.12.0,11.12.1)[12.5.0,12.5.1)
  • M
Resource Management Errors

[,1.6.1.24)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.2)
  • C
Arbitrary Command Injection

[,11.6)[11.25.0,11.25.2)[13.0,13.13)[13.17.0,13.17.1)[14.6.0,14.6.1)
  • H
NULL Pointer Dereference

[13.0.0,13.29.2)
  • M
CVE-2010-0685

[b.1.3.2,1.6.1]
  • M
Resource Management Errors

[,1.6.1.2)
  • M
Denial of Service (DoS)

[,12.3.1)
  • M
Information Exposure

[,1.2.35)[1.3.0.0,1.3.0.5)[1.4.26.0,1.4.26.3)[1.6.0.0,1.6.0.17)[1.6.1.0,1.6.1.9)
  • H
Denial of Service (DoS)

[,1.2.18)[1.4.0,1.4.3)
  • L
Improper Input Validation

[,1.8.15)[1.8.26.0,1.8.26.1)[11.0,11.6)[11.8.0,11.8.1)[12.1.0,12.1.1)
  • M
Cross-site Scripting (XSS)

[1.4.0,1.6.2.18.2]
  • M
CVE-2020-35652

[,13.38.0)[14.0,16.15.0)[17.0,17.9.0)[18.0,18.1.0)
  • M
Information Exposure

[13.0.0,13.21.1)(14.0.0,14.7.7)[15.0.0,15.4.1)
  • H
Resource Management Errors

[13.0.0,13.23.1)[14.0.0,14.7.7][15.0.0,15.6.1)
  • M
Information Exposure

[,1.6.2.21)[1.8.7.0,1.8.7.2)
  • M
Improper Authentication

[,b.2.5.1][b.2.5.1,c1.8.0][c1.8.0,1.0.2][1.0.2,1.2.27][1.2.27,1.4.19.1)
  • M
Information Exposure

[,1.8.15)[1.8.20.0,1.8.20.2)[10.12.0,10.12.2)[10.12.0,10.12.2)[11.2.0,11.2.2)
  • H
Access Restriction Bypass

[1.8.0,1.8.32.1)[11.0.0,11.14.1)[12.0.0,12.7.1)
  • H
Out-of-Bounds

[,0.1.0)
  • M
Out-of-Bounds

[,1.6.2.24)[1.8.11.0,1.8.11.1)[10.3.0,10.3.1)
  • M
Arbitrary Code Execution

[,1.2.7)
  • H
Information Exposure

[,11.6)[11.25.0,11.25.3)[13.0,13.13)[13.17.0,13.17.2)[14.6.0,14.6.2)
  • M
Denial of Service (DoS)

[1.4.5,1.4.11]
  • M
Improper Authentication

[,1.2.26)[1.4.0,1.4.16)
  • H
NULL Pointer Dereference

[,13.10.0]
  • M
Denial of Service (DoS)

[,1.8.4.2)
  • H
Resource Management Errors

[,1.2.0.1)[1.2.0,1.2.30)[1.4.21.0,1.4.21.2)
  • M
Improper Input Validation

[,b2.5.2][b2.5.2,1.2.28.1)
  • H
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.2)
  • H
Out-of-Bounds

[,11.2.2)
  • M
Denial of Service (DoS)

[,16.19.1)[18.5.0,18.5.1)
  • M
Out-of-Bounds

[,1.8.15)[1.8.24.0,1.8.24.1)[10.12.0,10.12.4)[10.12.0,10.12.4)[11.0,11.2)[11.6.0,11.6.1)
  • H
Out-of-Bounds

[,1.2.35)[1.3.0.0,1.3.0.3)[1.4.26.0,1.4.26.2)[1.6.0.0,1.6.0.15)[1.6.1.0,1.6.1.6)
  • H
Directory Traversal

[,1.2.10]
  • M
Buffer Overflow

[13.0.0,13.38.2)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.0)
  • M
Out-of-Bounds

[,1.8.15)[1.8.23.0,1.8.23.1)[11.0,11.2)[11.5.0,11.5.1)
  • M
SQL Injection

[b.2.3.0,b.2.3.4)[1.2.0,1.2.25)[1.4.0,1.4.15)
  • M
Improper Authentication

[15.0,15.4.1)
  • M
Out-of-Bounds

[,1.8.19.1)
  • L
Resource Management Errors

[,12.8.1)[13.1.0,13.1.1)
  • M
Denial of Service (DoS)

[,1.6.1.23)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.1)
  • H
Arbitrary Code Injection

[13.0.0,13.38.3)[16.0.0,16.19.1)[17.0.0,17.9.4)[18.0.0,18.15.1)
  • M
Remote Code Execution (RCE)

[,11.6)[11.10.0,11.10.1)[12.3.0,12.3.1)
  • H
Resource Management Errors

[,13.8.2][13.8.2,13.13][13.13,14.7.2][14.7.2,15.1.3)
  • M
NULL Pointer Dereference

[15.0.0,15.7.4)[16.0.0,16.5.1)
  • H
Out-of-Bounds

[,13.13.1)[14.2.0,14.2.1)
  • H
Improper Input Validation

[,1.8.15)[1.8.26.0,1.8.26.1)[11.0,11.6)[11.8.0,11.8.1)[12.1.0,12.1.1)
  • M
Denial of Service (DoS)

[,1.8.8.2)[10.0.0,10.0.1)
  • M
Buffer Overflow

[13.0,13.37.1)[16.0,16.8.0][16.8.0,16.14.1)[17.0,17.8.1)[18.0,18.0.1)
  • H
Improper Input Validation

[13.0.0,13.28.1)[16.0.0,16.5.1)
  • H
Incorrect Authorization

[1.6.1,1.6.1.8)
  • H
Improper Input Validation

[,1.4.40.1)[1.6.1.0,1.6.1.25)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.3)
  • M
Directory Traversal

[0.1.0,1.2.0_beta1]
  • M
Information Exposure

[,1.4.41.2)[1.6.2.0,1.6.2.18)[1.8.4.0,1.8.4.4)
  • M
Denial of Service (DoS)

[,11.6)[11.14.0,11.14.2)[12.7.0,12.7.2)[13.0.0,13.0.2)
  • M
Out-of-Bounds

[,1.8.19.1)
  • M
Improper Input Validation

[,12.5.1)
  • M
Resource Management Errors

[,11.14.1)
  • M
Out-of-Bounds

[,1.6.2.18)[1.8.4.0,1.8.4.3)
  • H
Denial of Service (DoS)

[,1.2.16)[1.4.0,1.4.1)
  • M
Integer Overflow or Wraparound

[15.0.0,15.7.2)[16.0.0,16.2.1)
  • M
Resource Management Errors

[,1.8.11)[1.8.13.0,1.8.13.1)[10.5.0,10.5.2)[10.5.0,10.5.2)
  • M
Out-of-bounds Write

[,c.3.6.2)[1.2.0,1.2.40][1.4.0,1.4.38.1)[1.4.39,1.4.39.1)[1.6.1,1.6.1.21)[1.6.2,1.6.2.15.1)[1.6.2.16,1.6.2.16.1)[1.8.0,1.8.1.2)[1.8.2,1.8.2.2)
  • M
Improper Authentication

[,1.6.2.24)[1.8.11.0,1.8.11.1)[10.3.0,10.3.1)
  • M
Access Restriction Bypass

[11.0.0,11.14.1)[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Improper Input Validation

[,1.4.41.1)[1.6.2.0,1.6.2.18)[1.8.4.0,1.8.4.3)
  • H
Denial of Service (DoS)

[,1.2.17)[1.4.0,1.4.2)
  • M
Improper Input Validation

[,1.6.0.22)[1.6.1.0,1.6.1.14)[1.6.2.0,1.6.2.2)
  • M
Access Restriction Bypass

[13.0.0,13.29.2)[16.0.0,16.6.2)[17.0.0,17.0.1)
  • H
SQL Injection

[0.1.7,0.4]
  • H
CVE-2021-26717

[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Out-of-Bounds

[,1.4.39.2)[1.6.1.0,1.6.1.22)[1.6.2.0,1.6.2.16)[1.8.2.0,1.8.2.4)
  • M
Denial of Service (DoS)

[,1.8.15)[1.8.28.0,1.8.28.1)[11.0,11.6)[11.10.0,11.10.1)[12.3.0,12.3.1)
  • H
Denial of Service (DoS)

[,1.2.18)[1.4.0,1.4.3)
  • M
Improper Input Validation

[,1.8.15)[1.8.23.0,1.8.23.1)[10.12.0,10.12.3)[10.12.0,10.12.3)[11.0,11.2)[11.5.0,11.5.1)
  • H
Denial of Service (DoS)

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • M
Integer Underflow

[,11.6)[11.21.0,11.21.1)[13.0,13.1)[13.7.0,13.7.1)
  • M
Out-of-Bounds

[13.0.0,13.13][13.13,13.18.4)[14.0.0,14.7.4)[15.0.0,15.1.4)
  • M
Denial of Service (DoS)

[,11.6)[11.21.0,11.21.1)[13.0,13.1)[13.7.0,13.7.1)
  • H
Arbitrary Code Execution

[,1.4.3)
  • H
Out-of-Bounds

[,1.8.10.1)[10.2.0,10.2.1)
  • M
Arbitrary Code Execution

[,1.0.7]
  • M
Improper Data Handling

[0,)
  • H
Out-of-Bounds

[,13.13)[13.15.0,13.15.1)[14.4.0,14.4.1)
  • M
Improper Data Handling

[,13.18)[14.0.0,14.7.6)[15.0.0,15.2.2)
  • L
Improper Access Control

[,1.8.11)[1.8.12.0,1.8.12.1)[10.4.0,10.4.1)
  • H
Insufficiently Protected Credentials

[,1.2.13)
  • H
NULL Pointer Dereference

[15.0.0,15.2.2)
  • H
Out-of-Bounds

[,15.6.2)[16.0.0,16.0.1)
  • M
Out-of-Bounds

[13.0.0,13.27.0)[15.0.0,15.7.2)[16.0.0,16.4.0)
  • M
Resource Management Errors

[,1.4.40.1)[1.6.1.0,1.6.1.25)[1.6.2.0,1.6.2.17)[1.8.3.0,1.8.3.3)
  • M
Out-of-Bounds

[,1.4.12.1)
  • H
Access Restriction Bypass

[13.0.0,14.0)[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0,18.2.1)
  • M
Access Restriction Bypass

[,1.8.11)[1.8.15.0,1.8.15.1)[10.7.0,10.7.1)[10.7.0,10.7.1)
  • H
Denial of Service (DoS)

[,1.2.13)
  • M
Out-of-bounds Write

[16.0.0,16.16.1)[17.0.0,17.9.2)[18.0.0,18.2.1)
  • M
Resource Management Errors

[,1.8.12.0][1.8.12.0,10.4.1)
  • M
Denial of Service (DoS)

[,1.8.4.3)
  • M
Denial of Service (DoS)

[,12.3.1)
  • L
Improper Input Validation

[,1.6.0.6)
  • M
Resource Management Errors

[,1.8.11)[1.8.13.0,1.8.13.1)[10.5.0,10.5.2)[10.5.0,10.5.2)
  • M
Improper Authentication

[b.2.3.4,1.2.30.3]
  • H
Out-of-Bounds

[,1.0.11)[1.2.0,1.2.9)
  • M
Access Restriction Bypass

[1.8.0,1.8.32.1)[11.0.0,11.14.1)[12.0.0,12.7.1)[13.0.0,13.0.1)
  • M
Cross-site Scripting (XSS)

[,b2.5.1][b2.5.1,c1.8.0][c1.8.0,1.0.3)
  • L
Improper Input Validation

[,12.1.0)
  • H
Access Restriction Bypass

[,a][a,b.2.5.0][b.2.5.0,c.1.6.1][c.1.6.1,1.0.1][1.0.1,1.2.26][1.2.26,1.4][1.4,1.4.17][1.4.17,1.4.19.1)
  • M
Access Restriction Bypass

[,1.6.0.25)[1.6.1.0,1.6.1.17)[1.6.2.0,1.6.2.5)
  • M
Out-of-Bounds

[,1.8.15)[1.8.20.0,1.8.20.2)[10.12.0,10.12.2)[10.12.0,10.12.2)[11.2.0,11.2.2)