{"id":"CVE-2021-32558","details":"An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur.","modified":"2026-04-10T04:31:45.309654Z","published":"2021-07-30T14:15:16.910Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00005.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4999"},{"type":"FIX","url":"https://issues.asterisk.org/jira/browse/ASTERISK-29392"},{"type":"FIX","url":"http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html"},{"type":"FIX","url":"http://seclists.org/fulldisclosure/2021/Jul/49"},{"type":"FIX","url":"https://downloads.asterisk.org/pub/security/AST-2021-008.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/asterisk/asterisk","events":[{"introduced":"85335355efb2d7914a1fe20ed31afcef15fd210c"},{"fixed":"4b05b9b4a8472c8f5703d53d29f692c04c1fce98"},{"introduced":"a65908f83e2f17a3aca7eb39c8e06045aca02674"},{"fixed":"faac96f75aa728925a7af0eed3fe3339cec80628"},{"introduced":"5ffe12b6ef30cd503f85d75745fd8d9c2cfafe47"},{"fixed":"3e17d375e4778e8c793bdcbf181e9547968997e2"},{"introduced":"2c1bba3cbec008c8ce35c78a2c79f9f207ea58bc"},{"fixed":"226868d1139af566c481265ef9657a1b33aa065e"},{"introduced":"0"},{"last_affected":"d436f568583184a13aa46349af5a3f0907087b44"},{"introduced":"0"},{"last_affected":"476bbcf3a3a8439c469ab31677cc87bbfd2fb214"},{"introduced":"0"},{"last_affected":"7b8157645f8c5f8599f160cd3374d2763564b55f"},{"introduced":"0"},{"last_affected":"d1bb76a27d2b8b4e4d32e77e8090997400f1d46d"},{"introduced":"0"},{"last_affected":"3d317239d5e94f07d387b31c46a6733cbc43e5ef"},{"introduced":"0"},{"last_affected":"bbaf9042cff308827c91e8235179b7ba27b48a33"},{"introduced":"0"},{"last_affected":"4d7a90d4e2c408af10dce738d6fc5ca491fcc83e"},{"introduced":"0"},{"last_affected":"21635f1e4075f13c8aabc6d9abdf183df416156b"},{"introduced":"0"},{"last_affected":"aabb04054a92d531c2ed82832e6d155a297253d1"},{"introduced":"0"},{"last_affected":"017416381fdcb5d222de2c2f39b17672506b061b"},{"introduced":"0"},{"last_affected":"cb9f1759fb996c99d5391135dd97db6f1e2d3387"},{"introduced":"0"},{"last_affected":"f777a0d87982e4f780099257e8157ec5341fb488"},{"introduced":"0"},{"last_affected":"10b274d1aba4fc2cf2a8cabcb66eb2a049e2250f"},{"introduced":"0"},{"last_affected":"5d0a019e13acc265b7805cb40f636a2680f927c1"},{"introduced":"0"},{"last_affected":"9e8def6e8b451ac6bca54ec2fd119e35ec84af62"},{"introduced":"0"},{"last_affected":"c3b6b056c44f920bad94d1dadda9a4bf579dd5e5"},{"introduced":"0"},{"last_affected":"91b991f2427bf1f4deb82985b051fc93ee408fda"},{"introduced":"0"},{"last_affected":"affbc6907eb544bc6e049085de91002ca24ff930"}],"database_specific":{"versions":[{"introduced":"13.0.0"},{"fixed":"13.38.3"},{"introduced":"16.0.0"},{"fixed":"16.19.1"},{"introduced":"17.0.0"},{"fixed":"17.9.4"},{"introduced":"18.0.0"},{"fixed":"18.15.1"},{"introduced":"0"},{"last_affected":"16.8-NA"},{"introduced":"0"},{"last_affected":"16.8-cert1\\-rc1"},{"introduced":"0"},{"last_affected":"16.8-cert1\\-rc2"},{"introduced":"0"},{"last_affected":"16.8-cert1\\-rc3"},{"introduced":"0"},{"last_affected":"16.8-cert1\\-rc4"},{"introduced":"0"},{"last_affected":"16.8-cert2"},{"introduced":"0"},{"last_affected":"16.8-cert3"},{"introduced":"0"},{"last_affected":"16.8-cert4"},{"introduced":"0"},{"last_affected":"16.8-cert4\\-rc1"},{"introduced":"0"},{"last_affected":"16.8-cert4\\-rc2"},{"introduced":"0"},{"last_affected":"16.8-cert4\\-rc3"},{"introduced":"0"},{"last_affected":"16.8-cert4\\-rc4"},{"introduced":"0"},{"last_affected":"16.8-cert5"},{"introduced":"0"},{"last_affected":"16.8-cert6"},{"introduced":"0"},{"last_affected":"16.8-cert7"},{"introduced":"0"},{"last_affected":"16.8-cert8"},{"introduced":"0"},{"last_affected":"16.8-cert9"},{"introduced":"0"},{"last_affected":"11.0"}]}}],"versions":["11.0.0","11.0.0-rc1","11.0.0-rc2","13.38.0","13.38.0-rc1","13.38.1","13.38.2","16.19.0","16.19.0-rc1","16.8.0","16.8.0-rc1","16.8.0-rc2","17.9.0","17.9.0-rc1","17.9.1","17.9.2","17.9.3","18.15.0","18.15.0-rc1","18.15.0-rc2","certified/16.8-cert1","certified/16.8-cert1-rc1","certified/16.8-cert1-rc2","certified/16.8-cert1-rc3","certified/16.8-cert1-rc4","certified/16.8-cert1-rc5","certified/16.8-cert2","certified/16.8-cert3","certified/16.8-cert4","certified/16.8-cert4-rc1","certified/16.8-cert4-rc2","certified/16.8-cert4-rc3","certified/16.8-cert4-rc4","certified/16.8-cert5","certified/16.8-cert6","certified/16.8-cert7","certified/16.8-cert8","certified/16.8-cert9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32558.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}