CVE-2022-26498

An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

04 May 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html -

27 Jan 2023, 20:04

Type Values Removed Values Added
First Time Debian
Debian debian Linux
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

18 Nov 2022, 16:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5285 -

17 Nov 2022, 14:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html -

22 Apr 2022, 17:53

Type Values Removed Values Added
References (MISC) https://downloads.asterisk.org/pub/security/ - (MISC) https://downloads.asterisk.org/pub/security/ - Vendor Advisory
References (MISC) https://downloads.asterisk.org/pub/security/AST-2022-001.html - (MISC) https://downloads.asterisk.org/pub/security/AST-2022-001.html - Patch, Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html - (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html - Patch, Third Party Advisory, VDB Entry
First Time Digium
Digium asterisk
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*

15 Apr 2022, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html -

15 Apr 2022, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-15 05:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-26498

Mitre link : CVE-2022-26498

CVE.ORG link : CVE-2022-26498


JSON object : View

Products Affected

digium

  • asterisk

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption