Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | all | asterisk | < 1:16.28.0~dfsg-0+deb11u3 | asterisk_1:16.28.0~dfsg-0+deb11u3_all.deb |
Debian | 10 | all | asterisk | < 1:16.2.1~dfsg-1+deb10u2 | asterisk_1:16.2.1~dfsg-1+deb10u2_all.deb |
Debian | 999 | all | asterisk | < 1:20.6.0~dfsg+~cs6.13.40431414-2 | asterisk_1:20.6.0~dfsg+~cs6.13.40431414-2_all.deb |