aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGuido Falsi <madpilot@FreeBSD.org>2022-03-05 09:37:17 +0000
committerGuido Falsi <madpilot@FreeBSD.org>2022-03-05 09:37:17 +0000
commit44b6cff717564bdc13636126696842a283b76130 (patch)
treea74231da7e6f203db27b7556f27af0cfc88c07fe
parent8b6724a9de622ca4e67273a88ac022636c1e5ac9 (diff)
downloadports-44b6cff717564bdc13636126696842a283b76130.tar.gz
ports-44b6cff717564bdc13636126696842a283b76130.zip
security/vuxml: Report new asterisk vulnerabilities.
-rw-r--r--security/vuxml/vuln-2022.xml48
1 files changed, 48 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 961be186f329..69de14c1d2c9 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,51 @@
+ <vuln vid="964c5460-9c66-11ec-ad3a-001999f8d30b">
+ <topic>asterisk -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.24.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk18</name>
+ <range><lt>18.10.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/downloads/security-advisories/">
+ <p>AST-2022-004 - The header length on incoming STUN
+ messages that contain an ERROR-CODE attribute is not
+ properly checked. This can result in an integer underflow.
+ Note, this requires ICE or WebRTC support to be in use
+ with a malicious remote party.</p>
+ <p>AST-2022-005 - When acting as a UAC, and when placing
+ an outgoing call to a target that then forks Asterisk may
+ experience undefined behavior (crashes, hangs, etc) after
+ a dialog set is prematurely freed.</p>
+ <p>AST-2022-006 - If an incoming SIP message contains a
+ malformed multi-part body an out of bounds read access
+ may occur, which can result in undefined behavior. Note,
+ its currently uncertain if there is any externally
+ exploitable vector within Asterisk for this issue, but
+ providing this as a security issue out of caution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-37706</cvename>
+ <cvename>CVE-2022-23608</cvename>
+ <cvename>CVE-2022-21723</cvename>
+ <url>https://downloads.asterisk.org/pub/security/AST-2022-004.html</url>
+ <url>https://downloads.asterisk.org/pub/security/AST-2022-005.html</url>
+ <url>https://downloads.asterisk.org/pub/security/AST-2022-006.html</url>
+ </references>
+ <dates>
+ <discovery>2022-03-03</discovery>
+ <entry>2022-03-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e0914087-9a09-11ec-9e61-3065ec8fd3ec">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>