vulnerability
Ubuntu: (CVE-2021-26713): asterisk vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Feb 19, 2021 | Jun 26, 2025 | Mar 27, 2026 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Feb 19, 2021
Added
Jun 26, 2025
Modified
Mar 27, 2026
Description
A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.
Solution
no-fix-ubuntu-package
References
- CVE-2021-26713
- https://attackerkb.com/topics/CVE-2021-26713
- CWE-787
- EUVD-EUVD-2021-13502
- https://downloads.asterisk.org/pub/security/
- https://downloads.asterisk.org/pub/security/AST-2021-004.html
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2021-13502
- https://issues.asterisk.org/jira/browse/ASTERISK-29205
- https://www.cve.org/CVERecord?id=CVE-2021-26713
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.