Unchecked Return Value Affecting asterisk package, versions [,18.24.3)[20.0.0,20.9.3)[21.0.0,21.4.3)[,18.9-cert12)[20.7-cert1-rc1,20.7-cert2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-7922477
  • published6 Sept 2024
  • disclosed5 Sept 2024
  • creditUnknown

Introduced: 5 Sep 2024

CVE-2024-42491  (opens in a new tab)
CWE-252  (opens in a new tab)

How to fix?

Upgrade asterisk to version 18.24.3, 20.9.3, 21.4.3, 18.9-cert12, 20.7-cert2 or higher.

Overview

Affected versions of this package are vulnerable to Unchecked Return Value through the handling of malformed SIP URIs. An attacker can cause a denial of service by sending a specially crafted SIP request that includes a URI with a malformed host portion.

Note: Versions in the ranges [,18.9-cert12) and [20.7-cert1-rc1,20.7-cert2) fix asterisk-certified.

CVSS Scores

version 4.0
version 3.1