CVE-2021-26713
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
19/02/2021
Last modified:
26/02/2021
Description
A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 16.0.0 (including) | 16.16.1 (excluding) |
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 17.0.0 (including) | 17.9.2 (excluding) |
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* | 18.0.0 (including) | 18.2.1 (excluding) |
cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:* | ||
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page