UBUNTU-CVE-2021-26712

Source
https://ubuntu.com/security/CVE-2021-26712
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-26712.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-26712
Related
Published
2021-02-18T21:15:00Z
Modified
2024-10-15T14:08:03Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.

References

Affected packages

Ubuntu:20.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:16.*

1:16.2.1~dfsg-2build2
1:16.2.1~dfsg-2build3
1:16.2.1~dfsg-2ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:16.*

1:16.16.1~dfsg-2
1:16.16.1~dfsg-4
1:16.16.1~dfsg-4build1
1:16.16.1~dfsg+~2.10-1

1:18.*

1:18.10.0~dfsg+~cs6.10.40431411-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:20.*

1:20.6.0~dfsg+~cs6.13.40431414-2build5
1:20.8.1~dfsg+~cs6.14.40431414-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / asterisk

Package

Name
asterisk
Purl
pkg:deb/ubuntu/asterisk?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:20.*

1:20.4.0~dfsg+~cs6.13.40431414-2
1:20.5.0~dfsg+~cs6.13.40431414-1
1:20.5.1~dfsg+~cs6.13.40431414-1
1:20.5.2~dfsg+~cs6.13.40431414-1
1:20.6.0~dfsg+~cs6.13.40431414-1
1:20.6.0~dfsg+~cs6.13.40431414-2
1:20.6.0~dfsg+~cs6.13.40431414-2build3
1:20.6.0~dfsg+~cs6.13.40431414-2build4
1:20.6.0~dfsg+~cs6.13.40431414-2build5

Ecosystem specific

{
    "ubuntu_priority": "medium"
}