CVE-2021-26712

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html - Third Party Advisory () http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html - Third Party Advisory
References () http://seclists.org/fulldisclosure/2021/Feb/59 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2021/Feb/59 - Mailing List, Third Party Advisory
References () https://downloads.asterisk.org/pub/security/ - Vendor Advisory () https://downloads.asterisk.org/pub/security/ - Vendor Advisory
References () https://downloads.asterisk.org/pub/security/AST-2021-003.html - Vendor Advisory () https://downloads.asterisk.org/pub/security/AST-2021-003.html - Vendor Advisory
References () https://issues.asterisk.org/jira/browse/ASTERISK-29260 - Issue Tracking, Patch, Vendor Advisory () https://issues.asterisk.org/jira/browse/ASTERISK-29260 - Issue Tracking, Patch, Vendor Advisory

Information

Published : 2021-02-18 21:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26712

Mitre link : CVE-2021-26712

CVE.ORG link : CVE-2021-26712


JSON object : View

Products Affected

digium

  • asterisk
  • certified_asterisk