Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-57767

Опубликовано: 28 авг. 2025
Источник: debian
EPSS Низкий

Описание

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:22.5.2~dfsg+~cs6.15.60671435-1package

Примечания

  • https://github.com/asterisk/asterisk/security/advisories/GHSA-64qc-9x89-rx5j

  • https://github.com/asterisk/asterisk/pull/1407

  • Fixed by: https://github.com/asterisk/asterisk/commit/02993717b08f899d4aca9888062f35dfb198584f

EPSS

Процентиль: 31%
0.00113
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
7 дней назад

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.

CVSS3: 7.5
nvd
7 дней назад

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.

EPSS

Процентиль: 31%
0.00113
Низкий