Incorrect Check of Function Return Value Affecting asterisk package, versions [,20.15.2)[21.0.0,21.10.2)[22.0.0,22.5.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-12301689
  • published31 Aug 2025
  • disclosed28 Aug 2025
  • creditPascal Cadotte Michaud

Introduced: 28 Aug 2025

NewCVE-2025-57767  (opens in a new tab)
CWE-253  (opens in a new tab)

How to fix?

Upgrade asterisk to version 20.15.2, 21.10.2, 22.5.2 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Check of Function Return Value via the get_authorization_header function when processing an incoming SIP request containing an Authorization header with a realm that was not present in a previous 401 response's WWW-Authenticate header, or when an incorrect realm is received without a prior 401 response. An attacker can cause a crash by sending a specially crafted SIP request with a malformed Authorization header.

CVSS Base Scores

version 4.0
version 3.1