CVE-2018-19278

Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
digiumasterisk
15.0.0
digiumasterisk
15.0.0:b1
digiumasterisk
15.0.0:rc1
digiumasterisk
15.1.0
digiumasterisk
15.1.0:rc1
digiumasterisk
15.1.0:rc2
digiumasterisk
15.1.2
digiumasterisk
15.1.3
digiumasterisk
15.1.4
digiumasterisk
15.1.5
digiumasterisk
15.2.0:rc1
digiumasterisk
15.2.0:rc2
digiumasterisk
15.2.1
digiumasterisk
15.2.2
digiumasterisk
15.3.0
digiumasterisk
15.3.0:rc1
digiumasterisk
15.3.0:rc2
digiumasterisk
15.4.0
digiumasterisk
15.4.0:rc1
digiumasterisk
15.4.0:rc2
digiumasterisk
15.4.1
digiumasterisk
15.5.0
digiumasterisk
15.5.0:rc1
digiumasterisk
15.6.0
digiumasterisk
15.6.0:rc1
digiumasterisk
15.6.1
digiumasterisk
16.0.0
digiumasterisk
16.0.0:rc2
digiumasterisk
16.0.0:rc3
digiumasterisk
16.0.1:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
asterisk
bullseye
1:16.28.0~dfsg-0+deb11u4
fixed
bullseye (security)
1:16.28.0~dfsg-0+deb11u5
fixed
sid
1:22.0.0~dfsg+~cs6.14.60671435-1
fixed