First published: Fri Jul 12 2019(Updated: )
Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium Asterisk | >=13.0.0<13.27.0 | |
Digium Asterisk | >=15.0.0<15.7.2 | |
Digium Asterisk | >=16.0.0<16.4.0 | |
Digium Certified Asterisk | =13.21-cert1 | |
Digium Certified Asterisk | =13.21-cert1-rc1 | |
Digium Certified Asterisk | =13.21-cert1-rc2 | |
Digium Certified Asterisk | =13.21-cert2 | |
Digium Certified Asterisk | =13.21-cert3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12827 is a buffer overflow vulnerability in the res_pjsip_messaging component of Digium Asterisk.
A remote authenticated user can exploit CVE-2019-12827 by sending a specially crafted SIP MESSAGE message.
Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier are affected by CVE-2019-12827.
CVE-2019-12827 has a severity rating of 6.5 (medium).
To fix CVE-2019-12827, it is recommended to update to the latest version of Digium Asterisk.