Vulnerability Description
main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | >= 13.0.0, <= 13.28.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2019-005.htmlVendor Advisory
- http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AThird Party AdvisoryVDB Entry
- http://downloads.asterisk.org/pub/security/AST-2019-005.htmlVendor Advisory
- http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AThird Party AdvisoryVDB Entry
FAQ
What is CVE-2019-15639?
CVE-2019-15639 is a vulnerability with a CVSS score of 7.5 (HIGH). main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
How severe is CVE-2019-15639?
CVE-2019-15639 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15639?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.