CVE-2024-35190

NameCVE-2024-35190
DescriptionAsterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)jessie, jessie (lts)1:11.13.1~dfsg-2+deb8u8fixed
stretch (security)1:13.14.1~dfsg-2+deb9u6fixed
stretch (lts), stretch1:13.14.1~dfsg-2+deb9u9fixed
buster (security), buster, buster (lts)1:16.28.0~dfsg-0+deb10u4fixed
bullseye (security), bullseye1:16.28.0~dfsg-0+deb11u4fixed
sid1:20.8.1~dfsg+~cs6.14.40431414-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksource(unstable)(not affected)

Notes

- asterisk <not-affected> (Vulnerable code not present)
https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9
https://github.com/asterisk/asterisk/pull/600
https://github.com/asterisk/asterisk/pull/602
https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d

Search for package or bug name: Reporting problems