CVE Vulnerabilities

CVE-2022-42705

Use After Free

Published: Dec 05, 2022 | Modified: Apr 24, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
AsteriskSangoma16.0.0 (including)16.29.1 (excluding)
AsteriskSangoma18.14.0 (including)18.15.1 (excluding)
AsteriskSangoma19.6.0 (including)19.7.1 (excluding)
AsteriskSangoma20.0.0 (including)20.0.0 (including)
Certified_asteriskSangoma18.9-cert2 (including)18.9-cert2 (including)
AsteriskUbuntubionic*
AsteriskUbuntufocal*
AsteriskUbuntukinetic*
AsteriskUbuntulunar*
AsteriskUbuntumantic*
AsteriskUbuntuoracular*
AsteriskUbuntuplucky*
AsteriskUbuntutrusty*
AsteriskUbuntuxenial*

Potential Mitigations

References