Source: asterisk
Version: 1:22.3.0~dfsg+~cs6.15.60671435-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for asterisk.

CVE-2025-47779[0]:
| Asterisk is an open-source private branch exchange (PBX). Prior to
| versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and
| versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP
| requests of the type MESSAGE (RFC 3428) authentication do not get
| proper alignment. An authenticated attacker can spoof any user
| identity to send spam messages to the user with their authorization
| token. Abuse of this security issue allows authenticated attackers
| to send fake chat messages can be spoofed to appear to come from
| trusted entities. Even administrators who follow Security best
| practices and Security Considerations can be impacted. Therefore,
| abuse can lead to spam and enable social engineering, phishing and
| similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of
| Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-
| asterisk fix the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-47779
    https://www.cve.org/CVERecord?id=CVE-2025-47779
[1] https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw
[2] 
https://github.com/asterisk/asterisk/commit/3d117fbb39cf192b67dfafd38acb64e0e5b31f3a

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to