CVE-2020-28327
https://notcve.org/view.php?id=CVE-2020-28327
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. • http://downloads.asterisk.org/pub/security/AST-2020-001.html https://issues.asterisk.org/jira/browse/ASTERISK-29057 • CWE-404: Improper Resource Shutdown or Release •
CVE-2017-9372
https://notcve.org/view.php?id=CVE-2017-9372
PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter. PJSIP, tal como es usado en Asterisk Open Source versiones 13.x y anteriores a 13.15.1 y versiones 14.x y anteriores a 14.4.1, Certified Asterisk versión 13.13 y anteriores a 13.13-cert4, y otros productos, permite a los atacantes remotos causar una denegación de servicio (desbordamiento de búfer y bloqueo de aplicación) por medio de un paquete SIP con un encabezado CSeq especialmente diseñado junto con un encabezado Via que carece de un parámetro branch. • http://downloads.asterisk.org/pub/security/AST-2017-002.txt http://www.debian.org/security/2017/dsa-3933 http://www.securityfocus.com/bid/98572 http://www.securitytracker.com/id/1038529 https://bugs.debian.org/863901 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-9359
https://notcve.org/view.php?id=CVE-2017-9359
The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. El analizador multi-part body en PJSIP, tal como es usado en Asterisk Open Source versiones 13.x y anteriores a 13.15.1 y versiones 14.x y anteriores a 14.4.1, Certified Asterisk versión 13.13 y anteriores a 13.13-cert4, y otros productos, permite a los atacantes remotos causar una denegación de servicio (lectura fuera de límites y bloqueo de aplicación) por medio de un paquete especialmente diseñado. • http://downloads.asterisk.org/pub/security/AST-2017-003.txt http://www.debian.org/security/2017/dsa-3933 http://www.securityfocus.com/bid/98578 https://bugs.debian.org/863902 https://issues.asterisk.org/jira/browse/ASTERISK-26939 • CWE-125: Out-of-bounds Read •