ID

VAR-202409-2372


CVE

CVE-2024-42491


TITLE

Sangoma  of  Asterisk  and  certified asterisk  Vulnerability regarding unchecked return value in

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471

DESCRIPTION

Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations. Sangoma of Asterisk and certified asterisk vulnerabilities related to unchecked return values, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-42491 // JVNDB: JVNDB-2024-027471

AFFECTED PRODUCTS

vendor:sangomamodel:certified asteriskscope:eqversion:20.7

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:18.9

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:18.24.3

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:20.9.3

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:ltversion:18.9

Trust: 1.0

vendor:sangomamodel:asteriskscope:lteversion:21.4.3

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:21.0.0

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:20.0.0

Trust: 1.0

vendor:sangomamodel:certified asteriskscope: - version: -

Trust: 0.8

vendor:sangomamodel:asteriskscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471 // NVD: CVE-2024-42491

CVSS

SEVERITY

CVSSV2

CVSSV3

security-advisories@github.com: CVE-2024-42491
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2024-027471
value: MEDIUM

Trust: 0.8

security-advisories@github.com: CVE-2024-42491
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-027471
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471 // NVD: CVE-2024-42491

PROBLEMTYPE DATA

problemtype:CWE-252

Trust: 1.0

problemtype:CWE-476

Trust: 1.0

problemtype:Unchecked return value (CWE-252) [ others ]

Trust: 0.8

problemtype:NULL Pointer dereference (CWE-476) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471 // NVD: CVE-2024-42491

EXTERNAL IDS

db:NVDid:CVE-2024-42491

Trust: 2.6

db:JVNDBid:JVNDB-2024-027471

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471 // NVD: CVE-2024-42491

REFERENCES

url:https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4

Trust: 1.8

url:https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742

Trust: 1.8

url:https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2

Trust: 1.8

url:https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8

Trust: 1.8

url:https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0

Trust: 1.8

url:https://github.com/asterisk/asterisk/security/advisories/ghsa-v428-g3cw-7hv9

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-42491

Trust: 0.8

sources: JVNDB: JVNDB-2024-027471 // NVD: CVE-2024-42491

SOURCES

db:JVNDBid:JVNDB-2024-027471
db:NVDid:CVE-2024-42491

LAST UPDATE DATE

2025-09-02T23:35:39.507000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-027471date:2025-08-27T02:45:00
db:NVDid:CVE-2024-42491date:2025-08-26T17:47:36.190

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-027471date:2025-08-27T00:00:00
db:NVDid:CVE-2024-42491date:2024-09-05T18:15:05.707