Type | URI |
---|---|
Vendor Advisory | https://downloads.asterisk.org/pub/security/AST-2020-003.html |
Vendor Advisory | https://downloads.asterisk.org/pub/security/AST-2020-004.html |
Exploit | https://issues.asterisk.org/jira/browse/ASTERISK-29191 |
Vendor Advisory | https://issues.asterisk.org/jira/browse/ASTERISK-29219 |
CPE URI | Source package | Min version | Max version |
---|---|---|---|
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* |
asterisk | >= None | < 13.38.0 |
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* |
asterisk | >= 14.0 | < 16.15.0 |
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* |
asterisk | >= 17.0 | < 17.9.0 |
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* |
asterisk | >= 18.0 | < 18.1.0 |
Source package | Branch | Version | Maintainer | Status |
---|---|---|---|---|
asterisk | 3.10-main | 16.3.0-r3 | Timo Teras <timo.teras@iki.fi> | possibly vulnerable |
asterisk | 3.11-main | 16.6.2-r1 | Timo Teras <timo.teras@iki.fi> | possibly vulnerable |