4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.008 Low
EPSS
Percentile
82.1%
A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions
13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash
Asterisk by deliberately misusing SIP 181 responses.
packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html
seclists.org/fulldisclosure/2021/Feb/57
downloads.asterisk.org/pub/security/AST-2021-001.html
issues.asterisk.org/
issues.asterisk.org/jira/browse/ASTERISK-29227
launchpad.net/bugs/cve/CVE-2020-35776
nvd.nist.gov/vuln/detail/CVE-2020-35776
security-tracker.debian.org/tracker/CVE-2020-35776
www.cve.org/CVERecord?id=CVE-2020-35776
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.008 Low
EPSS
Percentile
82.1%