{"id":"CVE-2020-35776","details":"A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.","modified":"2026-04-10T04:27:03.338286Z","published":"2021-02-18T20:15:12.447Z","references":[{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Feb/57"},{"type":"ADVISORY","url":"https://downloads.asterisk.org/pub/security/AST-2021-001.html"},{"type":"REPORT","url":"https://issues.asterisk.org/"},{"type":"FIX","url":"https://issues.asterisk.org/jira/browse/ASTERISK-29227"},{"type":"FIX","url":"http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/asterisk/asterisk","events":[{"introduced":"85335355efb2d7914a1fe20ed31afcef15fd210c"},{"last_affected":"3f100c22d4664012247efed391c595833a15d7ee"},{"introduced":"a65908f83e2f17a3aca7eb39c8e06045aca02674"},{"last_affected":"105df4b089e19c7e296d425965623f3428720cd1"},{"introduced":"5ffe12b6ef30cd503f85d75745fd8d9c2cfafe47"},{"last_affected":"1edb44b2a9e6d68cfccf4339044751c8830e1d14"},{"introduced":"2c1bba3cbec008c8ce35c78a2c79f9f207ea58bc"},{"last_affected":"fd5b3a1b6f686db27f98281ec21a9c8fb04a787c"}],"database_specific":{"versions":[{"introduced":"13.0.0"},{"last_affected":"13.38.1"},{"introduced":"16.0.0"},{"last_affected":"16.15.1"},{"introduced":"17.0.0"},{"last_affected":"17.9.1"},{"introduced":"18.0"},{"last_affected":"18.1.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35776.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}