CVE-2022-26498

An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

04 May 2023, 17:15

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References
  • (MISC) http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html -
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory

18 Nov 2022, 16:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5285 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html -

22 Apr 2022, 17:53

Type Values Removed Values Added
CPE cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
References (MISC) https://downloads.asterisk.org/pub/security/AST-2022-001.html - (MISC) https://downloads.asterisk.org/pub/security/AST-2022-001.html - Patch, Vendor Advisory
References (MISC) https://downloads.asterisk.org/pub/security/ - (MISC) https://downloads.asterisk.org/pub/security/ - Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html - (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html - Patch, Third Party Advisory, VDB Entry
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

15 Apr 2022, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html -

15 Apr 2022, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-15 05:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-26498

Mitre link : CVE-2022-26498

CVE.ORG link : CVE-2022-26498


JSON object : View

Products Affected

digium

  • asterisk

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption