Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Asterisk | Digium | 13.0.0 | 13.38.2 |
Asterisk | Digium | 16.0.0 | * |
Asterisk | Digium | 17.0.0 | * |
Asterisk | Digium | 18.0 | * |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Certified_asterisk | Digium | 16.8 | 16.8 |
Asterisk | Ubuntu | devel | * |
Asterisk | Ubuntu | focal | * |
Asterisk | Ubuntu | groovy | * |
Asterisk | Ubuntu | hirsute | * |
Asterisk | Ubuntu | impish | * |
Asterisk | Ubuntu | jammy | * |
Asterisk | Ubuntu | trusty | * |