{"id":"CVE-2025-57767","summary":"Asterisk can crash from a specifically malformed Authorization header in an incoming SIP request","details":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.15.2, 21.10.2, and 22.5.2, if a SIP request is received with an Authorization header that contains a realm that wasn't in a previous 401 response's WWW-Authenticate header, or an Authorization header with an incorrect realm was received without a previous 401 response being sent, the get_authorization_header() function in res_pjsip_authenticator_digest will return a NULL. This wasn't being checked before attempting to get the digest algorithm from the header which causes a SEGV. This issue has been patched in versions 20.15.2, 21.10.2, and 22.5.2. There are no workarounds.","aliases":["GHSA-64qc-9x89-rx5j"],"modified":"2026-04-10T05:31:10.754777Z","published":"2025-08-28T15:33:00.087Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/57xxx/CVE-2025-57767.json","cwe_ids":["CWE-253"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/57xxx/CVE-2025-57767.json"},{"type":"ADVISORY","url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-64qc-9x89-rx5j"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-57767"},{"type":"FIX","url":"https://github.com/asterisk/asterisk/commit/02993717b08f899d4aca9888062f35dfb198584f"},{"type":"FIX","url":"https://github.com/asterisk/asterisk/pull/1407"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/asterisk/asterisk","events":[{"introduced":"8e4a09f71162ebc1e4bb2159dfc638aa2328047c"},{"fixed":"f34af3980567b3616ecd49730408bb6dff792de9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57767.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}