First published: Fri Apr 15 2022(Updated: )
An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium Asterisk | >=16.15.0<=16.25.1 | |
Digium Asterisk | >=18.0<18.11.2 | |
Digium Asterisk | >=19.0.0<=19.3.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:20.5.2~dfsg+~cs6.13.40431414-1 |
http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26498 is a vulnerability discovered in Asterisk through version 19.x that allows the download of files that are not certificates, leading to resource exhaustion.
CVE-2022-26498 affects Asterisk through version 19.x when using STIR/SHAKEN.
The severity of CVE-2022-26498 is not specified in the provided information.
You can fix CVE-2022-26498 by updating to Asterisk version 16.25.2, 18.11.2, or 19.3.2.
You can find more information about CVE-2022-26498 on the Asterisk and Debian security trackers.