CVE-2022-42705

A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:20.0.0:*:*:*:*:*:*:*
cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://downloads.asterisk.org/pub/security/AST-2022-008.html - Patch, Vendor Advisory () https://downloads.asterisk.org/pub/security/AST-2022-008.html - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html - () https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html -
References () https://www.debian.org/security/2023/dsa-5358 - () https://www.debian.org/security/2023/dsa-5358 -

Information

Published : 2022-12-05 21:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42705

Mitre link : CVE-2022-42705

CVE.ORG link : CVE-2022-42705


JSON object : View

Products Affected

sangoma

  • certified_asterisk
  • asterisk
CWE
CWE-416

Use After Free