{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T12:22:23.341","vulnerabilities":[{"cve":{"id":"CVE-2024-42491","sourceIdentifier":"security-advisories@github.com","published":"2024-09-05T18:15:05.707","lastModified":"2025-11-03T22:18:06.950","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations."},{"lang":"es","value":"Asterisk es una centralita privada (PBX) de código abierto. En versiones anteriores a las 18.24.3, 20.9.3 y 21.4.3 de Asterisk y las versiones 18.9-cert12 y 20.7-cert2 de certificate-asterisk, si Asterisk intenta enviar una solicitud SIP a una URI cuya parte de host comienza con `.1` o `[.1]`, y res_resolver_unbound está cargado, Asterisk se bloqueará con un SEGV. Para recibir un parche, los usuarios deben actualizar a una de las siguientes versiones: 18.24.3, 20.9.3, 21.4.3, certificate-18.9-cert12, certificate-20.7-cert2. Hay dos workarounds disponibles. Deshabilite res_resolver_unbound configurando `noload = res_resolver_unbound.so` en modules.conf, o configure `rewrite_contact = yes` en todos los endpoints PJSIP. NOTA: Esto puede no ser apropiado para todas las configuraciones de Asterisk."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-252"},{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionEndExcluding":"18.24.3","matchCriteriaId":"5755DE4B-FD1C-4B6B-86B8-FC1FD90717B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"20.0.0","versionEndExcluding":"20.9.3","matchCriteriaId":"089E3015-4E8B-4ADE-9C14-9F2CE78986F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndIncluding":"21.4.3","matchCriteriaId":"FC916081-F612-4234-A7BB-BB1614154A28"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*","versionEndExcluding":"18.9","matchCriteriaId":"B71A493F-F47B-4F19-AD21-3800DE63DF5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:-:*:*:*:*:*:*","matchCriteriaId":"2A7FA28D-33B7-4F20-8235-E66C21019875"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*","matchCriteriaId":"79EEB5E5-B79E-454B-8DCD-3272BA337A9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"AD3BBA39-95EC-462F-8F5A-15E8D07CC804"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert10:*:*:*:*:*:*","matchCriteriaId":"D6BF553C-020D-4F99-9995-CA4A4383B2DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert11:*:*:*:*:*:*","matchCriteriaId":"E3069F1F-DDE8-4E9A-B4FF-64B7B11EEFCB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*","matchCriteriaId":"892BAE5D-A64E-4FE0-9A99-8C07F342A042"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*","matchCriteriaId":"1A716A45-7075-4CA6-9EF5-2DD088248A5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*","matchCriteriaId":"80EFA05B-E22D-49CE-BDD6-5C7123F1C12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*","matchCriteriaId":"20FD475F-2B46-47C9-B535-1561E29CB7A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert6:*:*:*:*:*:*","matchCriteriaId":"7238FCD9-9F40-44BA-A170-69D4857AA1CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert7:*:*:*:*:*:*","matchCriteriaId":"F657B046-6C83-48F9-A0B1-C63CDA7FD61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8:*:*:*:*:*:*","matchCriteriaId":"6D87C7DE-23EA-4532-A2E4-9BF82ADE12DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:*","matchCriteriaId":"B79A5B46-5CA3-445E-BE47-1711DCD038A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:*","matchCriteriaId":"D600B37E-94EA-48DE-B48E-871B3A983721"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:18.9:cert9:*:*:*:*:*:*","matchCriteriaId":"2FC3A00E-D1C6-467F-8FE7-E8437A527B3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:*","matchCriteriaId":"79225576-AF7C-4099-9624-C53578A7417F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"29323E6E-12C9-46C7-B29C-25E0CD537A8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"8E563972-78C0-40A0-83EA-6A3BA3D71946"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:*","matchCriteriaId":"64209621-D458-432A-B0E3-C8D0B6698574"}]}]}],"references":[{"url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00016.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}