First published: Mon Sep 09 2019(Updated: )
main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium Asterisk | >=13.0.0<=13.28.0 | |
Digium Asterisk | >=16.0.0<=16.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Sangoma Asterisk is CVE-2019-15639.
The severity level of CVE-2019-15639 is high, with a CVSS score of 7.5.
Sangoma Asterisk versions 13.28.0 and 16.5.0 are affected by CVE-2019-15639.
CVE-2019-15639 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
You can find more information about CVE-2019-15639 at the following references: [AST-2019-005](http://downloads.asterisk.org/pub/security/AST-2019-005.html) and [Asterisk Project Security Advisory AST-2019-005](http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html).