Sunday, April 17, 2022

Asterisk Project Security Advisory - AST-2022-001

               Asterisk Project Security Advisory - AST-2022-001

Product Asterisk
Summary res_stir_shaken: resource exhaustion with large
Nature of Advisory Resource exhaustion
Susceptibility Remote unauthenticated access
Severity Major
Exploits Known No
Reported On Jan 21, 2022
Reported By Ben Ford
Posted On Apr 14, 2022
Last Updated On April 13, 2022
Advisory Contact bford AT sangoma DOT com
CVE Name CVE-2022-26498

Description When using STIR/SHAKEN, it’s possible to download
files that are not certificates. These files could be
much larger than what you would expect to download.
Modules Affected res_stir_shaken

Resolution If you are using STIR/SHAKEN in Asterisk, upgrade to one of
the versions listed below. Asterisk now checks the
downloaded file to see if it’s actually a certificate or if
it is larger than what is expected.

If not upgrading, the curl_timeout option in
stir_shaken.conf should be utilized so that downloads do not
last an extended period of time.

Affected Versions
Product Release Series
Asterisk Open Source 16.x 16.15.0 and after
Asterisk Open Source 18.x All versions
Asterisk Open Source 19.x All versions

Corrected In
Product Release
Asterisk Open Source 16.25.2, 18.11.2, 19.3.2

Patch URL Revision Asterisk
16 Asterisk
18 Asterisk


Asterisk Project Security Advisories are posted at

This document may be superseded by later versions; if so, the latest
version will be posted at and

Revision History
Date Editor Revisions Made
Apr 13, 2022 Ben Ford Initial revision

Asterisk Project Security Advisory - AST-2022-001
Copyright © 01/19/2022 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Copyright © 2021 Vulnerability Database | Cyber Details™

thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore